High severity7.5NVD Advisory· Published Apr 7, 2026· Updated Apr 28, 2026
CVE-2026-35485
CVE-2026-35485
Description
text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_grammar() allows reading any file on the server filesystem with no extension restriction. Gradio does not server-side validate dropdown values, so an attacker can POST directory traversal payloads (e.g., ../../../etc/passwd) via the API and receive the full file contents in the response. This vulnerability is fixed in 4.3.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/oobabooga/text-generation-webui/security/advisories/GHSA-hqg5-487v-5mc6nvdExploitVendor Advisory
News mentions
0No linked articles in our index yet.