CVE-2026-34524
HIGH WAF: High
CVSS 8.8
Published: 2026-04-02
CWE-22
SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in chat endpoints allows an authenticated attacker to read and delete arbitrary files under their user data root (for example secrets.json and settings.json) by supplying avatar_url="..". This issue has been patched in version 1.17.0.
WAF Coverage Analysis
Path Traversal
High WAF Coverage
OWASP: A01:2021 Broken Access Control
930xxx - Local File Inclusion
Affected Software
| Vendor | Product | Version |
|---|---|---|
| sillytavern | sillytavern | up to 1.17.0 |
References
- github.com (Release Notes)
- github.com (Vendor Advisory, Exploit)