Cyber Posture

CVE-2026-34522

HighPublic PoC

Published: 02 April 2026

Published
02 April 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0008 22.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34522 is a high-severity Path Traversal (CWE-22) vulnerability in Sillytavern Sillytavern. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 22.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the path traversal vulnerability by identifying, testing, and installing the patch released in SillyTavern version 1.17.0.

prevent

Requires validation of the character_name input parameter to block traversal sequences like '../' before processing file writes.

prevent

Enforces least privilege on the SillyTavern process to restrict filesystem write access outside the intended chats directory, limiting exploitation impact.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
Why these techniques?

The path traversal vulnerability in the network-accessible /api/chats/import endpoint directly enables exploitation of a public-facing application (T1190). It facilitates arbitrary file writes to unintended locations, allowing adversaries to transfer tools or files into the environment (T1105).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in /api/chats/import allows an authenticated attacker to…

more

write attacker-controlled files outside the intended chats directory by injecting traversal sequences into character_name. This issue has been patched in version 1.17.0.

Deeper analysisAI

CVE-2026-34522 is a path traversal vulnerability (CWE-22, CWE-73) affecting SillyTavern, a locally installed user interface for interacting with text generation large language models, image generation engines, and text-to-speech voice models. The issue resides in the /api/chats/import endpoint prior to version 1.17.0, where an attacker can inject traversal sequences into the character_name parameter to write attacker-controlled files outside the intended chats directory. The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H), indicating high severity due to its potential for significant integrity and availability impacts.

An authenticated attacker with low privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By crafting a malicious request to the import endpoint, the attacker can place arbitrary files in unintended locations on the filesystem, potentially overwriting critical configuration files, scripts, or other system resources, leading to unauthorized modifications (high integrity impact) or service disruption (high availability impact).

The SillyTavern security advisory (GHSA-xvww-xhx6-22pf) and release notes for version 1.17.0 confirm that the vulnerability has been patched by addressing the path traversal in the import functionality. Security practitioners should upgrade to version 1.17.0 or later to mitigate the issue.

SillyTavern's role in facilitating local interactions with AI/ML models like LLMs for text generation underscores its relevance in AI development environments, where filesystem access controls are critical to prevent supply chain compromises. No public reports of real-world exploitation are available as of the CVE publication on 2026-04-02.

Details

CWE(s)

Affected Products

sillytavern
sillytavern
≤ 1.17.0

CVEs Like This One

CVE-2026-34524Same product: Sillytavern Sillytavern
CVE-2026-26286Same product: Sillytavern Sillytavern
CVE-2026-39308Shared CWE-22
CVE-2026-7398Shared CWE-22
CVE-2026-27969Shared CWE-22
CVE-2026-41180Shared CWE-22
CVE-2025-64712Shared CWE-22, CWE-73
CVE-2026-32055Shared CWE-22
CVE-2026-21878Shared CWE-22
CVE-2026-23949Shared CWE-22

References