Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62364: CWE-59: Improper Link Resolution Before File Access ('Link Following') in oobabooga text-generation-webui

0
Medium
VulnerabilityCVE-2025-62364cvecve-2025-62364cwe-59
Published: Mon Oct 13 2025 (10/13/2025, 20:30:56 UTC)
Source: CVE Database V5
Vendor/Project: oobabooga
Product: text-generation-webui

Description

text-generation-webui is an open-source web interface for running Large Language Models. In versions through 3.13, a Local File Inclusion vulnerability exists in the character picture upload feature. An attacker can upload a text file containing a symbolic link to an arbitrary file path. When the application processes the upload, it follows the symbolic link and serves the contents of the targeted file through the web interface. This allows an unauthenticated attacker to read sensitive files on the server, potentially exposing system configurations, credentials, and other confidential information. This vulnerability is fixed in 3.14. No known workarounds exist.

AI-Powered Analysis

AILast updated: 10/21/2025, 00:43:54 UTC

Technical Analysis

CVE-2025-62364 is a Local File Inclusion (LFI) vulnerability classified under CWE-59 (Improper Link Resolution Before File Access) affecting the open-source oobabooga text-generation-webui, a web interface for running Large Language Models. In versions up to 3.13, the vulnerability arises from the character picture upload feature, which improperly handles symbolic links within uploaded files. An attacker can craft and upload a text file containing a symbolic link that points to any arbitrary file path on the server's filesystem. When the application processes this upload, it follows the symbolic link and serves the contents of the linked file through the web interface. This behavior allows an unauthenticated attacker to read sensitive files without needing credentials or user interaction. The exposed files could include critical system configuration files, credential stores, or other confidential data, potentially enabling further attacks or information leakage. The vulnerability requires the attacker to have the ability to upload files to the server, which may be possible if the upload feature is publicly accessible or insufficiently protected. The issue is resolved in version 3.14 of the software. The CVSS 3.1 base score is 6.2, reflecting a medium severity with high confidentiality impact, no integrity or availability impact, low attack complexity, no privileges required, and no user interaction needed. No known exploits are currently reported in the wild.

Potential Impact

For European organizations deploying the oobabooga text-generation-webui in versions up to 3.13, this vulnerability poses a significant risk of unauthorized disclosure of sensitive internal files. Exposure of configuration files or credentials could lead to further compromise, including privilege escalation or lateral movement within networks. Given the growing adoption of AI and LLM interfaces in research, education, and enterprise environments across Europe, organizations using this software in production or research settings could face data breaches or intellectual property theft. The vulnerability’s requirement for file upload access limits the attack surface but does not eliminate risk, especially if the upload endpoint is publicly accessible or insufficiently restricted. Confidentiality impact is high, but integrity and availability remain unaffected. The lack of authentication requirement increases risk, as any attacker with upload capability can exploit the flaw. This could undermine trust in AI platforms and lead to regulatory compliance issues under GDPR if personal or sensitive data is exposed.

Mitigation Recommendations

The primary mitigation is to upgrade the oobabooga text-generation-webui to version 3.14 or later, where the vulnerability is fixed. Until upgrade is possible, organizations should restrict or disable the character picture upload feature, especially on publicly accessible instances. Implement strict access controls and authentication on the upload endpoint to prevent unauthenticated uploads. Employ file type validation and disallow symbolic link files or any file types that can contain links. Monitor logs for suspicious upload activity and access to sensitive files. Use web application firewalls (WAFs) to detect and block attempts to exploit symbolic link traversal. Conduct regular security audits of AI platform deployments and isolate these services within segmented network zones to limit exposure. Educate administrators and users about the risks of uploading untrusted files. Finally, maintain up-to-date backups and incident response plans in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-10T14:22:48.203Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ed6345e828b4dd3cbdd2b9

Added to database: 10/13/2025, 8:38:29 PM

Last enriched: 10/21/2025, 12:43:54 AM

Last updated: 12/4/2025, 1:53:18 PM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats