top of page
perceptive_background_267k.jpg

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, he superbooga and superboogav2 RAG extensions fetch user-…

Published:

6 april 2026 om 22:00:00

Alert date:

7 april 2026 om 17:04:54

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Emerging Technologies

CVE-2026-35486 affects text-generation-webui, an open-source web interface for Large Language Models. Prior to version 4.3, the superbooga and superboogav2 RAG extensions performed unvalidated URL fetching via requests.get() without scheme checks, IP filtering, or hostname allowlists. Attackers can exploit this Server-Side Request Forgery (SSRF) vulnerability to access cloud metadata endpoints, steal IAM credentials, and probe internal services. The fetched content can be exfiltrated through the RAG pipeline. This vulnerability has been patched in version 4.3.

Technical details

Mitigation steps:

Affected products:

text-generation-webui

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page