Threat Advisory

SillyTavern Vulnerabilities in Delete and Export Endpoints

Threat: Vulnerability
Threat Actor Name: -
Threat Actor Type: -
Targeted Region: Global
Alias: -
Threat Actor Region: -
Targeted Sector: Technology & IT
Criticality: High

Enter Your Email to see Lab Reports

Loading...

EXECUTIVE SUMMARY:

Two high‑severity path traversal vulnerabilities were discovered in the SillyTavern open‑source chat application affecting versions. Both issues, tracked as stem from improper sanitization of user‑controlled file path input, allowing attackers to access, delete, or write arbitrary files outside intended directories. These flaws were responsibly disclosed and have been patched in version, mitigating the risks. CVE-2026-34524 with a CVSS score of 8.3 – A path traversal vulnerability in chat endpoints allows an authenticated attacker to read and delete arbitrary files under their user data root by supplying `avatar_url=".."`. This issue can be exploited by an attacker with low privileges and no user interaction required. The attacker can delete critical per-user files and break account operation. CVE-2026-34522 with a CVSS score of 8.1 – A path traversal vulnerability in `/api/chats/import` allows an authenticated attacker to write attacker-controlled files outside the intended chats directory by injecting traversal sequences into `character_name`. This issue can be exploited by an attacker with low privileges and no user interaction required. The attacker can create files in unintended filesystem locations and cause disk abuse and disruptive file placement.

crossmenu