CVE-2026-34522 in SillyTaverninfo

Summary

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in /api/chats/import allows an authenticated attacker to write attacker-controlled files outside the intended chats directory by injecting traversal sequences into character_name. This issue has been patched in version 1.17.0.

Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Responsible

GitHub_M

Reservation

03/30/2026

Disclosure

04/02/2026

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Do you want to use VulDB in your project?

Use the official API to access entries easily!