Multiple vulnerabilities have been discovered in SillyTavern, including path traversal and server-side request forgery (SSRF) issues. These vulnerabilities could allow attackers to read or write arbitrary files, or make requests to internal services. Users running affected versions are strongly advised to update to version 1.17.0 to mitigate these risks.
These vulnerabilities range from medium to high severity, potentially leading to data compromise.
What is Sillytavern?
CVE-2026-34526: SSRF via Incomplete IP Validation
Medium severity due to limited SSRF exploitation.
EPSS score not available.
SillyTavern's IP validation in the `/api/search/visit` endpoint is incomplete, allowing Server-Side Request Forgery (SSRF). An attacker can bypass the validation using `localhost`, IPv6 loopback (`[::1]`), or DNS names resolving to internal addresses, potentially accessing internal services.
How to fix CVE-2026-34526 in SillyTavern
Patch within 7 days- 1.Update SillyTavern to version 1.17.0 or later.
npm update sillytavernWorkaround: No known workaround.
NextGuard automatically flags CVE-2026-34526 if SillyTavern appears in any of your monitored projects — no manual lookup required.
CVE-2026-34524: Path Traversal in Chat Endpoints
High severity due to arbitrary file read/delete.
EPSS score not available.
A path traversal vulnerability exists in the `/api/chats/export` and `/api/chats/delete` endpoints of SillyTavern. An authenticated attacker can read and delete arbitrary files within the user data root by manipulating the `avatar_url` parameter.
How to fix CVE-2026-34524 in SillyTavern
Patch immediately- 1.Update SillyTavern to version 1.17.0 or later.
npm update sillytavernWorkaround: No known workaround.
NextGuard automatically flags CVE-2026-34524 if SillyTavern appears in any of your monitored projects — no manual lookup required.
CVE-2026-34523: File Existence Oracle via Path Traversal
Medium severity due to file existence disclosure.
EPSS score not available.
A path traversal vulnerability in the static file route handler of SillyTavern allows unauthenticated users to determine the existence of files on the server's filesystem. By using percent-encoded `../` sequences in requests, an attacker can probe for file existence.
How to fix CVE-2026-34523 in SillyTavern
Patch within 7 days- 1.Update SillyTavern to version 1.17.0 or later.
npm update sillytavernWorkaround: No known workaround.
NextGuard automatically flags CVE-2026-34523 if SillyTavern appears in any of your monitored projects — no manual lookup required.
CVE-2026-34522: Path Traversal in `/api/chats/import`
High severity due to arbitrary file write.
EPSS score not available.
A path traversal vulnerability in the `/api/chats/import` endpoint of SillyTavern allows authenticated attackers to write files outside the intended chats directory. By injecting traversal sequences into the `character_name` parameter, an attacker can write arbitrary files.
How to fix CVE-2026-34522 in SillyTavern
Patch immediately- 1.Update SillyTavern to version 1.17.0 or later.
npm update sillytavernWorkaround: No known workaround.
NextGuard automatically flags CVE-2026-34522 if SillyTavern appears in any of your monitored projects — no manual lookup required.
Stay ahead of nodejs vulnerabilities
Proactively manage your application security by identifying and remediating vulnerabilities. Use NextGuard to monitor your nodejs dependencies and receive alerts on new threats.
Compare PlansFrequently asked questions
Multiple vulnerabilities were discovered in SillyTavern and have been addressed in version 1.17.0. It is crucial to update to the latest version to ensure the security of your application. See all nodejs vulnerabilities.
Related topics