CVE-2026-35050
text-generation-webui · text-generation-webui
The text-generation-webui application allows arbitrary Python file overwriting via extension settings, leading to remote code execution.
Executive summary
A critical file overwrite vulnerability in text-generation-webui allows attackers to gain remote code execution by replacing application scripts.
Vulnerability
The application permits saving extension settings in Python format within the application root. An attacker can overwrite critical files, such as download-model.py, which are subsequently executed by the application.
Business impact
This vulnerability enables an attacker to achieve persistent code execution on the server running the web interface. Given the 9.1 CVSS score, this facilitates total system compromise and potential access to sensitive model files or user data.
Remediation
Immediate Action: Update to text-generation-webui version 4.1.1 or later.
Proactive Monitoring: Monitor the application root directory for unauthorized file modifications or changes to existing Python scripts.
Compensating Controls: Restrict write permissions on the application directory to the absolute minimum required for the application to function.
Exploitation status
Public Exploit Available: Unknown
Analyst recommendation
The risk of persistent code execution requires immediate remediation. Users must update the software and ensure that file system permissions are correctly configured to prevent unauthorized writes to critical application files.