Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oobabooga text Generation Web Ui
|
|
| CPEs | cpe:2.3:a:oobabooga:text_generation_web_ui:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Oobabooga text Generation Web Ui
|
Thu, 09 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oobabooga
Oobabooga text-generation-webui |
|
| Vendors & Products |
Oobabooga
Oobabooga text-generation-webui |
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, he superbooga and superboogav2 RAG extensions fetch user-supplied URLs via requests.get() with zero validation — no scheme check, no IP filtering, no hostname allowlist. An attacker can access cloud metadata endpoints, steal IAM credentials, and probe internal services. The fetched content is exfiltrated through the RAG pipeline. This vulnerability is fixed in 4.3. | |
| Title | text-generation-webui has a SSRF in superbooga/superboogav2 extensions — no URL validation | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-09T14:37:31.599Z
Reserved: 2026-04-02T20:49:44.454Z
Link: CVE-2026-35486
Updated: 2026-04-09T14:37:23.287Z
Status : Analyzed
Published: 2026-04-07T16:16:26.700
Modified: 2026-04-09T18:48:51.350
Link: CVE-2026-35486
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:48:39Z