Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-525j-2hrj-m8fp | SillyTavern: Path Traversal allows file existence oracle |
Mon, 13 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:sillytavern:sillytavern:*:*:*:*:*:node.js:*:* |
Fri, 03 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sillytavern
Sillytavern sillytavern |
|
| Vendors & Products |
Sillytavern
Sillytavern sillytavern |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in the static file route handler allows any unauthenticated user to determine whether files exist anywhere on the server's filesystem. by sending percent-encoded "../" sequences (%2E%2E%2F) in requests to static file routes, an attacker can check for the existence of files. This issue has been patched in version 1.17.0. | |
| Title | SillyTavern: Path traversal allows file existence oracle | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T15:56:24.472Z
Reserved: 2026-03-30T16:03:31.048Z
Link: CVE-2026-34523
Updated: 2026-04-03T15:56:15.595Z
Status : Analyzed
Published: 2026-04-02T18:16:29.613
Modified: 2026-04-13T18:35:55.150
Link: CVE-2026-34523
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:42:01Z
Github GHSA