EXECUTIVE SUMMARY:
Two high‑severity path traversal vulnerabilities were discovered in the SillyTavern open‑source chat application affecting versions. Both issues, tracked as stem from improper sanitization of user‑controlled file path input, allowing attackers to access, delete, or write arbitrary files outside intended directories. These flaws were responsibly disclosed and have been patched in version, mitigating the risks. CVE-2026-34524 with a CVSS score of 8.3 – A path traversal vulnerability in chat endpoints allows an authenticated attacker to read and delete arbitrary files under their user data root by supplying `avatar_url=".."`. This issue can be exploited by an attacker with low privileges and no user interaction required. The attacker can delete critical per-user files and break account operation. CVE-2026-34522 with a CVSS score of 8.1 – A path traversal vulnerability in `/api/chats/import` allows an authenticated attacker to write attacker-controlled files outside the intended chats directory by injecting traversal sequences into `character_name`. This issue can be exploited by an attacker with low privileges and no user interaction required. The attacker can create files in unintended filesystem locations and cause disk abuse and disruptive file placement.