Description
SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in chat endpoints allows an authenticated attacker to read and delete arbitrary files under their user data root (for example secrets.json and settings.json) by supplying avatar_url="..". This issue has been patched in version 1.17.0.
Published: 2026-04-02
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary read and deletion of user data files
Action: Immediate update
AI Analysis

Impact

This flaw stems from a path‑traversal vulnerability in the chat export and delete endpoints of SillyTavern. By submitting an authenticated request with avatar_url set to "..", an attacker can read or delete any file located under the application’s user data root, such as secrets.json and settings.json. The vulnerability is classified as CWE‑22 and permits both confidentiality compromise through exfiltration of sensitive files and integrity damage through file deletion.

Affected Systems

The issue affects the SillyTavern user interface for local machine use, with all releases prior to version 1.17.0 vulnerable. The patch was applied in release 1.17.0 and newer. No additional product or vendor variants are listed.

Risk and Exploitability

The CVSS score of 8.3 indicates high severity, though exploitation requires local authenticated access to the application. The EPSS score is currently unavailable, and the vulnerability is not listed in the CISA KEV catalog, suggesting it is not yet widely exploited. In practice, any user who can run SillyTavern and possesses valid credentials can craft a request to reveal or delete arbitrary files within their user data root, thereby gaining covert access to private configuration or destroying key files that may disrupt the user’s workflow. The attack vector is inferred to be a local authenticated user invoking the vulnerable endpoint, as described.

Generated by OpenCVE AI on April 2, 2026 at 22:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SillyTavern to version 1.17.0 or newer
  • Limit access to the application to trusted local accounts
  • If an upgrade is not immediately possible, disable or shield the /api/chats/export and /api/chats/delete endpoints until the patch can be applied

Generated by OpenCVE AI on April 2, 2026 at 22:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-vprr-q85p-79mf SillyTavern: Path Traversal in `/api/chats/export` and `/api/chats/delete` allows arbitrary file read/delete within user data root
History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Sillytavern
Sillytavern sillytavern
Vendors & Products Sillytavern
Sillytavern sillytavern

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in chat endpoints allows an authenticated attacker to read and delete arbitrary files under their user data root (for example secrets.json and settings.json) by supplying avatar_url="..". This issue has been patched in version 1.17.0.
Title SillyTavern: Path traversal in `/api/chats/export` and `/api/chats/delete` allows arbitrary file read/delete within user data root
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}


Subscriptions

Sillytavern Sillytavern
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T18:12:52.047Z

Reserved: 2026-03-30T16:03:31.048Z

Link: CVE-2026-34524

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-02T18:16:29.763

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-34524

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:18:07Z

Weaknesses