Platform
python
Component
text-generation-webui
Opgelost in
4.1.2
CVE-2026-35050 describes a Remote Code Execution (RCE) vulnerability discovered in text-generation-webui, an open-source web interface for Large Language Models. This flaw allows attackers to overwrite Python files within the application's root directory, potentially leading to arbitrary code execution. Versions prior to 4.1.1 are affected, and a fix is available in version 4.1.1.
The primary impact of CVE-2026-35050 is the ability for an attacker to execute arbitrary code on the server hosting the text-generation-webui application. This is achieved by saving malicious extension settings in a '.py' format and overwriting critical files, such as 'download-model.py'. When a user attempts to download a new model, the attacker's code is triggered, granting them control over the server. The blast radius extends to any data processed or stored by the webui, including potentially sensitive user data or model configurations. Successful exploitation could lead to complete system compromise and data exfiltration.
CVE-2026-35050 was publicly disclosed on 2026-04-06. There is currently no indication of active exploitation campaigns targeting this vulnerability. The vulnerability is not listed on the CISA KEV catalog. Public proof-of-concept (POC) code is likely to emerge given the ease of exploitation, increasing the risk of widespread attacks.
Organizations and individuals using text-generation-webui for local LLM inference are at risk. This includes developers experimenting with LLMs, researchers, and hobbyists. Shared hosting environments where multiple users have write access to the webui installation are particularly vulnerable.
• linux / server: Monitor file system integrity using tools like AIDE or Tripwire for unauthorized modifications to files in the text-generation-webui root directory. Specifically, check for modifications to 'download-model.py'.
find /path/to/text-generation-webui -type f -mmin -60 -print0 | xargs -0 md5sum | grep -v 'expected_md5_hash'• python: Monitor Python script execution using system monitoring tools. Look for unexpected or unauthorized script executions.
import psutil
for proc in psutil.process_iter(['pid', 'name', 'cmdline']):
if 'python' in proc.info['name'].lower() and 'download-model.py' in ' '.join(proc.info['cmdline']):
print(f'Suspicious Python process: PID={proc.info['pid']}, Command={proc.info['cmdline']}')disclosure
Exploit Status
EPSS
0.08% (23% percentiel)
CISA SSVC
CVSS-vector
The primary mitigation for CVE-2026-35050 is to immediately upgrade text-generation-webui to version 4.1.1 or later. If upgrading is not immediately feasible, restrict write access to the application's root directory to prevent unauthorized file modifications. Consider implementing a Web Application Firewall (WAF) with rules to detect and block suspicious file uploads or modifications. Monitor system logs for unusual Python script executions or file modifications. After upgrading, confirm the fix by attempting to download a model and verifying that no unexpected code is executed.
Actualice a la versión 4.1.1 o superior para mitigar la vulnerabilidad de ejecución remota de código. Esta versión corrige el problema de recorrido de directorios que permite la sobrescritura de archivos Python y su posterior ejecución.
Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.
CVE-2026-35050 is a critical Remote Code Execution vulnerability in text-generation-webui versions before 4.1.1, allowing attackers to execute arbitrary code by overwriting Python files.
You are affected if you are using text-generation-webui versions prior to 4.1.1. Immediately check your version and upgrade if necessary.
Upgrade text-generation-webui to version 4.1.1 or later. As a temporary workaround, restrict write access to the application's root directory.
There is currently no confirmed active exploitation, but the ease of exploitation suggests a high risk of future attacks.
Refer to the text-generation-webui GitHub repository for the latest security advisories and updates: [https://github.com/oobabooga/text-generation-webui](https://github.com/oobabooga/text-generation-webui)
Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.
Upload je requirements.txt-bestand en we vertellen je direct of je getroffen bent.