Impact
This flaw stems from a path‑traversal vulnerability in the chat export and delete endpoints of SillyTavern. By submitting an authenticated request with avatar_url set to "..", an attacker can read or delete any file located under the application’s user data root, such as secrets.json and settings.json. The vulnerability is classified as CWE‑22 and permits both confidentiality compromise through exfiltration of sensitive files and integrity damage through file deletion.
Affected Systems
The issue affects the SillyTavern user interface for local machine use, with all releases prior to version 1.17.0 vulnerable. The patch was applied in release 1.17.0 and newer. No additional product or vendor variants are listed.
Risk and Exploitability
The CVSS score of 8.3 indicates high severity, though exploitation requires local authenticated access to the application. The EPSS score is currently unavailable, and the vulnerability is not listed in the CISA KEV catalog, suggesting it is not yet widely exploited. In practice, any user who can run SillyTavern and possesses valid credentials can craft a request to reveal or delete arbitrary files within their user data root, thereby gaining covert access to private configuration or destroying key files that may disrupt the user’s workflow. The attack vector is inferred to be a local authenticated user invoking the vulnerable endpoint, as described.
OpenCVE Enrichment
Github GHSA