Cyber Posture

CVE-2026-26286

HighPublic PoC

Published: 19 February 2026

Published
19 February 2026
Modified
20 February 2026
KEV Added
Patch
CVSS Score 8.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
EPSS Score 0.0002 3.9th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26286 is a high-severity SSRF (CWE-918) vulnerability in Sillytavern Sillytavern. Its CVSS base score is 8.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Remote System Discovery (T1018); ranked at the 3.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Remote System Discovery (T1018) and 3 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of the asset download URL input to restrict requests to whitelisted domains, directly preventing SSRF exploitation as implemented in the patch.

prevent

Monitors and controls outbound communications at system boundaries, blocking server requests to internal services, cloud metadata, and private networks.

prevent

Mandates timely flaw remediation through software updates, directly addressing the SSRF vulnerability fixed in SillyTavern 1.16.0.

MITRE ATT&CK Enterprise TechniquesAI

T1018 Remote System Discovery Discovery
Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system.
T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
T1522 Cloud Instance Metadata API Credential Access
Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.
T1552.005 Cloud Instance Metadata API Credential Access
Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.
Why these techniques?

SSRF directly enables server-initiated HTTP requests to internal/private resources (T1018/T1046 for discovery) and cloud metadata endpoints (T1522/T1552.005 for credential access).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. In versions prior to 1.16.0, a Server-Side Request Forgery (SSRF) vulnerability in the asset download…

more

endpoint allows authenticated users to make arbitrary HTTP requests from the server and read the full response body, enabling access to internal services, cloud metadata, and private network resources. The vulnerability has been patched in the version 1.16.0 by introducing a whitelist domain check for asset download requests. It can be reviewed and customized by editing the `whitelistImportDomains` array in the `config.yaml` file.

Deeper analysisAI

CVE-2026-26286 is a Server-Side Request Forgery (SSRF) vulnerability, classified under CWE-918, affecting SillyTavern, a locally installed user interface for interacting with text generation large language models, image generation engines, and text-to-speech voice models. The issue resides in the asset download endpoint in versions prior to 1.16.0, where insufficient validation allows authenticated users to trigger arbitrary HTTP requests from the server and retrieve the full response body.

An authenticated user with low privileges (PR:L) can exploit this vulnerability remotely (AV:N) with low complexity (AC:L) and no user interaction (UI:N), achieving high confidentiality impact (C:H) through changed scope (S:C) and low integrity impact (I:L), as reflected in its CVSS v3.1 base score of 8.5. Attackers can leverage the SSRF to access internal services, cloud metadata endpoints, and private network resources by crafting malicious requests via the asset download functionality.

The vulnerability was addressed in SillyTavern version 1.16.0 through the addition of a whitelist domain check for asset download requests, which can be reviewed and customized by editing the `whitelistImportDomains` array in the `config.yaml` file. Details are available in the GitHub Security Advisory at https://github.com/SillyTavern/SillyTavern/security/advisories/GHSA-cccp-94vg-j92r.

Details

CWE(s)

Affected Products

sillytavern
sillytavern
≤ 1.16.0

CVEs Like This One

CVE-2026-34522Same product: Sillytavern Sillytavern
CVE-2026-34524Same product: Sillytavern Sillytavern
CVE-2026-33226Shared CWE-918
CVE-2026-30953Shared CWE-918
CVE-2026-33024Shared CWE-918
CVE-2026-5936Shared CWE-918
CVE-2026-32133Shared CWE-918
CVE-2026-40348Shared CWE-918
CVE-2026-30232Shared CWE-918
CVE-2026-3478Shared CWE-918

References