Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-35050 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Path Traversal in Text Generation Web UI. πŸ“‰ **Consequences**: Attackers can overwrite Python files via `.py` extension settings, leading to **Arbitrary Code Execution (ACE)**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-22**: Improper Limitation of a Pathname to a Restricted Directory.…

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Vendor**: oobabooga. πŸ“¦ **Product**: text-generation-webui. ⚠️ **Affected**: Versions **prior to 4.1.1**. πŸ“… **Published**: 2026-04-06.

Q4What can hackers do? (Privileges/Data)

πŸ’» **Privileges**: Remote Code Execution. πŸ“‚ **Data**: Full control over the server's file system. πŸ”„ **Action**: Hackers can inject malicious Python code, effectively taking over the local AI environment.

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **Auth Required**: Yes (PR:H). 🌐 **Access**: Network (AV:N). 🎯 **Complexity**: Low (AC:L). ⚠️ **Note**: Requires authenticated access, but exploitation logic is straightforward once inside.

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exp**: No PoCs listed in the data. πŸ“œ **Reference**: GitHub Security Advisory (GHSA-jg96-p5p6-q3cv) is the primary source. πŸ•΅οΈ **Status**: Theoretical risk until PoC emerges.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Verify version number < 4.1.1. πŸ“‚ **Scan**: Look for unsanitized file paths in extension settings. πŸ§ͺ **Test**: Attempt to save a setting with a `../` payload in the filename field (if UI allows).

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. πŸ› οΈ **Patch**: Upgrade to **Text Generation Web UI 4.1.1** or later. πŸ”— **Source**: Official GitHub Security Advisory.

Q9What if no patch? (Workaround)

🚧 **Workaround**: Disable extension settings saving if possible. 🚫 **Restrict**: Limit file write permissions for the application user. πŸ›‘ **Isolate**: Run in a sandboxed environment or container.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: HIGH. 🚨 **Reason**: CVSS Score is **9.1** (Critical). πŸƒ **Action**: Patch immediately if running unpatched versions. ⏳ **Urgency**: Do not ignore; ACE risk is severe.