<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sillytavern — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/sillytavern/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 02 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/sillytavern/feed.xml" rel="self" type="application/rss+xml"/><item><title>SillyTavern Path Traversal Vulnerability in Chat Endpoints</title><link>https://feed.craftedsignal.io/briefs/2026-04-sillytavern-path-traversal/</link><pubDate>Thu, 02 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sillytavern-path-traversal/</guid><description>A path traversal vulnerability in SillyTavern versions 1.16.0 and earlier allows an authenticated attacker to read and delete arbitrary files under their user data root by manipulating the avatar_url parameter in the `/api/chats/export` and `/api/chats/delete` endpoints.</description><content:encoded><![CDATA[<p>SillyTavern, a local web UI for large language models, is vulnerable to a path traversal attack. This vulnerability, affecting versions 1.16.0 and earlier, stems from insufficient input validation in the <code>avatar_url</code> parameter of the <code>/api/chats/export</code> and <code>/api/chats/delete</code> endpoints. An authenticated attacker can exploit this flaw to read or delete arbitrary files within the user&rsquo;s data directory. The vulnerability exists because the application fails to adequately sanitize path traversal sequences like <code>..</code> when constructing file paths. This can lead to the exposure of sensitive information such as <code>secrets.json</code> and <code>settings.json</code>, or the deletion of crucial user data, particularly in multi-user or remotely-accessible deployments. The vulnerability was patched in version 1.17.0 and assigned CVE-2026-34524.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the SillyTavern application using valid credentials, obtaining a session cookie and CSRF token.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/api/chats/export</code> or <code>/api/chats/delete</code> endpoint.</li>
<li>The attacker sets the <code>avatar_url</code> parameter in the request body to a path traversal sequence, such as <code>..</code>, to navigate outside the intended &ldquo;chats&rdquo; directory.</li>
<li>In the <code>/api/chats/export</code> endpoint, the attacker specifies the <code>file</code> parameter to point to the desired file to read, such as <code>secrets.json</code>.</li>
<li>The server-side application uses <code>path.join</code> to concatenate the user&rsquo;s chats directory with the attacker-controlled <code>avatar_url</code> and <code>file</code> parameters, resulting in path traversal.</li>
<li>The application reads the contents of the file specified by the attacker.</li>
<li>In the <code>/api/chats/delete</code> endpoint, the attacker specifies the <code>chatfile</code> parameter to point to the desired file to delete, such as <code>settings.json</code>.</li>
<li>The application deletes the file specified by the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can have significant consequences. Attackers can gain unauthorized access to sensitive configuration files like <code>secrets.json</code>, potentially exposing API keys, passwords, and other confidential information. Furthermore, the ability to delete arbitrary files allows attackers to disrupt the application&rsquo;s functionality or even render a user&rsquo;s account unusable by deleting critical files such as <code>settings.json</code>. The risk is amplified in multi-user environments or remotely-accessible deployments, where the impact can extend to multiple users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to SillyTavern version 1.17.0 or later to patch CVE-2026-34524.</li>
<li>Deploy the Sigma rule &ldquo;Detect SillyTavern Path Traversal Attempt via API Export&rdquo; to detect attempts to exploit the <code>/api/chats/export</code> endpoint by monitoring for path traversal sequences in the <code>cs-uri-query</code> field.</li>
<li>Deploy the Sigma rule &ldquo;Detect SillyTavern Path Traversal Attempt via API Delete&rdquo; to detect attempts to exploit the <code>/api/chats/delete</code> endpoint by monitoring for path traversal sequences in the <code>cs-uri-query</code> field.</li>
<li>Review web server access logs for unusual requests to <code>/api/chats/export</code> or <code>/api/chats/delete</code> with suspicious <code>avatar_url</code> parameters.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>sillytavern</category></item></channel></rss>