PT-2026-20938 · Unknown · Sillytavern
Q1Uf3Ng
·
Published
2026-02-19
·
Updated
2026-03-25
·
CVE-2026-26286
CVSS v3.1
8.5
High
| AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
SillyTavern versions prior to 1.16.0
Description
SillyTavern is a locally installed user interface for interacting with large language models, image generation engines, and text-to-speech voice models. A Server-Side Request Forgery (SSRF) exists in the asset download endpoint for versions prior to 1.16.0. This allows authenticated users to make arbitrary HTTP requests from the server and read the full response body, potentially exposing internal services, cloud metadata, and private network resources. The issue is addressed by a whitelist domain check for asset download requests introduced in version 1.16.0, configurable via the
whitelistImportDomains array in the config.yaml file.Recommendations
Upgrade to SillyTavern version 1.16.0 or later.
Review and customize the
whitelistImportDomains array in the config.yaml file to ensure appropriate domain restrictions.Exploit
Fix
SSRF
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Sillytavern