Threat Advisory

SillyTavern Vulnerabilities Enable Remote Execution

Threat: Vulnerability
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: Critical
[subscribe_to_unlock_form]

EXECUTIVE SUMMARY:

Multiple security vulnerabilities have been identified in SillyTavern, a web-based application that allows users to configure authentication using SSO headers. The affected product versions are 1.17.0 and earlier. These vulnerabilities are primarily related to authentication bypass, session management, and path traversal. Business risk and impact include unauthorized access, account takeover, and data loss. If exploited, these vulnerabilities can lead to significant consequences, including financial loss, reputational damage, and compliance issues.[/subscribe_to_unlock_form]

EXECUTIVE SUMMARY:

Multiple security vulnerabilities have been identified in SillyTavern, a web-based application that allows users to configure authentication using SSO headers. The affected product versions are 1.17.0 and earlier. These vulnerabilities are primarily related to authentication bypass, session management, and path traversal. Business risk and impact include unauthorized access, account takeover, and data loss. If exploited, these vulnerabilities can lead to significant consequences, including financial loss, reputational damage, and compliance issues.[emaillocker id="1283"]

  • CVE-2026-44649 with a CVSS score of 9.8 - SillyTavern has Authentication Bypass via SSO Header Injection. An attacker can inject SSO headers to authenticate as any user, including administrators, without a password. This vulnerability is exploitable when sso.autheliaAuth or sso.authentikAuth is set to true in config.yaml.
  • CVE-2026-44648 with a CVSS score of 7.5 - SillyTavern has Existing sessions are not invalidated after password change, allowing session reuse and account takeover. An attacker with a stolen cookie can retain access even after the victim resets their password.
  • CVE-2026-44650 with a CVSS score of 9.1 - SillyTavern has a Path Traversal issue. An attacker can delete the entire extensions directory with a single HTTP request, causing all installed third-party extensions to be unrecoverably lost.

These vulnerabilities highlight the importance of robust authentication and session management practices in web-based applications. If left unaddressed, they can lead to significant consequences, including financial loss, reputational damage, and compliance issues. It is essential to address these vulnerabilities promptly to ensure the security and integrity of SillyTavern.

RECOMMENDATION:

  • We recommend you to update SillyTavern to version 1.18.0.

REFERENCES:

The following reports contain further technical details:
https://github.com/advisories/GHSA-gxx6-h3g6-vwjh
https://github.com/advisories/GHSA-wmm3-h9qj-p5v6
https://github.com/advisories/GHSA-886q-f44j-h6wh

[/emaillocker]
crossmenu