Impact
The flaw resides in the asset download endpoint of SillyTavern. Users with authentication can instruct the server to perform arbitrary HTTP requests, and read the full response body. This grants access to internal services, cloud metadata, and private network resources, increasing the risk of data exposure and potential lateral movement. The vulnerability exists in all releases prior to 1.16.0 and was fixed by adding a whitelist domain check.
Affected Systems
SillyTavern SillyTavern versions released before 1.16.0 are affected. Versions 1.16.0 and later contain the whitelist domain check and are considered fixed.
Risk and Exploitability
The CVSS score of 7.1 indicates a high risk, while the EPSS score of less than 1% shows a very low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to be authenticated on the local application; an attacker with local user privileges can craft requests via the asset download endpoint, potentially targeting internal IP ranges.
OpenCVE Enrichment