


Perceptive Security
SOC/SIEM Consultancy

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, he superbooga and superboogav2 RAG extensions fetch user-…
Published:
6 april 2026 om 22:00:00
Alert date:
7 april 2026 om 17:04:54
Source:
nvd.nist.gov
Web Technologies, Emerging Technologies
CVE-2026-35486 affects text-generation-webui, an open-source web interface for Large Language Models. Prior to version 4.3, the superbooga and superboogav2 RAG extensions performed unvalidated URL fetching via requests.get() without scheme checks, IP filtering, or hostname allowlists. Attackers can exploit this Server-Side Request Forgery (SSRF) vulnerability to access cloud metadata endpoints, steal IAM credentials, and probe internal services. The fetched content can be exfiltrated through the RAG pipeline. This vulnerability has been patched in version 4.3.
Technical details
Mitigation steps:
Affected products:
text-generation-webui
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-35486
https://github.com/oobabooga/text-generation-webui/security/advisories/GHSA-jvrj-w5hq-6cp2
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
