CVE-2026-34524 in SillyTaverninfo

Summary

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in chat endpoints allows an authenticated attacker to read and delete arbitrary files under their user data root (for example secrets.json and settings.json) by supplying avatar_url="..". This issue has been patched in version 1.17.0.

Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Responsible

GitHub_M

Reservation

03/30/2026

Disclosure

04/02/2026

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Might our Artificial Intelligence support you?

Check our Alexa App!