Impact
The vulnerability in SillyTavern’s /api/search/visit endpoint allows an attacker to cause the server to issue HTTP requests to hostnames supplied by the user. Because the server only validates numeric IPv4 dotted‑quad addresses, values such as "localhost", the IPv6 loopback "[::1]", or DNS names that resolve to internal IPv4 addresses bypass the check. The attacker can direct the server to talk to services on the local machine or within the local network, exposing sensitive data or enabling further lateral movement. The weakness maps to the classic server‑side request forgery category.
Affected Systems
All installations of SillyTavern running a version earlier than 1.17.0 are affected, regardless of operating system or deployment environment. The issue is confined to the search‑visit endpoint logic and was addressed in the 1.17.0 release.
Risk and Exploitability
This flaw has a CVSS score of 5.0, placing it in the medium severity range. No EPSS score is available, and it is not listed in CISA’s Known Exploited Vulnerabilities catalog, suggesting no confirmed exploits in the wild yet. An attacker would need either local access or a way to submit a request to the vulnerable endpoint; the exploit is limited to services listening on default ports 80 or 443, reducing the potential impact compared to a fully unrestricted SSRF but still providing a meaningful attack surface.
OpenCVE Enrichment
Github GHSA