Description
SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in /api/chats/import allows an authenticated attacker to write attacker-controlled files outside the intended chats directory by injecting traversal sequences into character_name. This issue has been patched in version 1.17.0.
Published: 2026-04-02
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Write
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a path‑traversal flaw in the /api/chats/import endpoint of SillyTavern. By injecting directory traversal sequences into the character_name field, an authenticated user can cause the application to write files outside the designated chats directory. This allows the attacker to create or overwrite arbitrary files on the system, potentially enabling code execution, data exfiltration, or other abuses. The weakness is classified as CWE‑22 and CWE‑73, resulting in an arbitrary file write that compromises integrity and confidentiality of the host environment.

Affected Systems

Affected systems are SillyTavern installations in all versions earlier than 1.17.0. Users who run the locally installed application and authenticate to the API before the 1.17.0 release are vulnerable. The problem was fixed in release 1.17.0.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity, but the EPSS score is below 1%, suggesting a low current exploitation probability. Because the flaw requires an authenticated session, the actual risk is limited to users who can log in to the local interface or have local access to the server. The vulnerability is not listed in the CISA KEV catalog, so there are no known exploits yet, but the high severity warrants prompt action.

Generated by OpenCVE AI on April 13, 2026 at 19:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SillyTavern to version 1.17.0 or later.
  • Restrict access to /api/chats/import to authorized users only.
  • Ensure the chat directory has write permissions only for the application process.
  • Monitor logs for unexpected file creation outside the chat directory.

Generated by OpenCVE AI on April 13, 2026 at 19:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xvww-xhx6-22pf SillyTavern has a path traversal in `/api/chats/import` allows arbitrary file write outside intended chat directory
History

Mon, 13 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sillytavern:sillytavern:*:*:*:*:*:node.js:*:*

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Sillytavern
Sillytavern sillytavern
Vendors & Products Sillytavern
Sillytavern sillytavern

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in /api/chats/import allows an authenticated attacker to write attacker-controlled files outside the intended chats directory by injecting traversal sequences into character_name. This issue has been patched in version 1.17.0.
Title SillyTavern: Path traversal in `/api/chats/import` allows arbitrary file write outside intended chat directory
Weaknesses CWE-22
CWE-73
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Sillytavern Sillytavern
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T19:00:48.579Z

Reserved: 2026-03-30T16:03:31.048Z

Link: CVE-2026-34522

cve-icon Vulnrichment

Updated: 2026-04-02T19:00:44.311Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T18:16:29.453

Modified: 2026-04-13T18:34:46.317

Link: CVE-2026-34522

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:42:02Z

Weaknesses