Advisory Details

October 30th, 2025

oobabooga text-generation-webui trust_remote_code Reliance on Untrusted Inputs Remote Code Execution Vulnerability

ZDI-25-981
ZDI-CAN-26680

CVE ID CVE-2025-12488
CVSS SCORE 9.8, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS oobabooga
AFFECTED PRODUCTS text-generation-webui
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of oobabooga text-generation-webui. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of the trust_remote_code parameter provided to the load endpoint. The issue results from the lack of proper validation of a user-supplied argument before using it to load a model. An attacker can leverage this vulnerability to execute code in the context of the service account.

ADDITIONAL DETAILS oobabooga has issued an update to correct this vulnerability. More details can be found at:
https://github.com/oobabooga/text-generation-webui/commit/b5a6904c4ac4049823396090360b6f566f4e4603
DISCLOSURE TIMELINE
  • 2025-03-12 - Vulnerability reported to vendor
  • 2025-10-30 - Coordinated public release of advisory
  • 2025-10-30 - Advisory Updated
CREDIT Nicholas Zubrisky (@NZubrisky) of Trend Micro Security Research
BACK TO ADVISORIES