CVE-2026-35050

text-generation-webui · text-generation-webui

The text-generation-webui application allows arbitrary Python file overwriting via extension settings, leading to remote code execution.

Executive summary

A critical file overwrite vulnerability in text-generation-webui allows attackers to gain remote code execution by replacing application scripts.

Vulnerability

The application permits saving extension settings in Python format within the application root. An attacker can overwrite critical files, such as download-model.py, which are subsequently executed by the application.

Business impact

This vulnerability enables an attacker to achieve persistent code execution on the server running the web interface. Given the 9.1 CVSS score, this facilitates total system compromise and potential access to sensitive model files or user data.

Remediation

Immediate Action: Update to text-generation-webui version 4.1.1 or later.

Proactive Monitoring: Monitor the application root directory for unauthorized file modifications or changes to existing Python scripts.

Compensating Controls: Restrict write permissions on the application directory to the absolute minimum required for the application to function.

Exploitation status

Public Exploit Available: Unknown

Analyst recommendation

The risk of persistent code execution requires immediate remediation. Users must update the software and ensure that file system permissions are correctly configured to prevent unauthorized writes to critical application files.