Impact
A path traversal flaw in SillyTavern’s static file handler permits an unauthenticated user to confirm the presence of any file on the server by sending percent‑encoded '../' sequences. The result is a file‑existence oracle that reveals the file system layout and can expose sensitive data files. Although the vulnerability does not directly enable code execution, it provides a useful foothold for further attacks that rely on knowledge of the file structure.
Affected Systems
The flaw affects the SillyTavern locally installed user interface, covering all versions released before 1.17.0 that run on Node.js. The vulnerability applies to any instance of SillyTavern where the static file route is reachable by external or local users.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity, and the EPSS score of less than 1% shows that automated exploitation attempts are unlikely at present. Because the attack target is an unauthenticated local or remote user who can reach the static routes, the risk is higher in environments where the application is exposed to untrusted traffic. The issue is not listed in the CISA KEV catalog, suggesting no known active exploitation in the wild.
OpenCVE Enrichment
Github GHSA