CVE-2026-34526

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, in src/endpoints/search.js, the hostname is checked against /^\d+\.\d+\.\d+\.\d+$/. This only matches literal dotted-quad IPv4 (e.g. 127.0.0.1, 10.0.0.1). It does not catch: localhost (hostname, not dotted-quad), [::1] (IPv6 loopback), and DNS names resolving to internal addresses (e.g. localtest.me -> 127.0.0.1). A separate port check (urlObj.port !== '') limits exploitation to services on default ports (80/443), making this lower severity than a fully unrestricted SSRF. This issue has been patched in version 1.17.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sillytavern:sillytavern:*:*:*:*:*:node.js:*:*

History

13 Apr 2026, 18:39

Type Values Removed Values Added
CPE cpe:2.3:a:sillytavern:sillytavern:*:*:*:*:*:node.js:*:*
References () https://github.com/SillyTavern/SillyTavern/releases/tag/1.17.0 - () https://github.com/SillyTavern/SillyTavern/releases/tag/1.17.0 - Release Notes
References () https://github.com/SillyTavern/SillyTavern/security/advisories/GHSA-wm7j-m6jm-8797 - () https://github.com/SillyTavern/SillyTavern/security/advisories/GHSA-wm7j-m6jm-8797 - Vendor Advisory, Exploit
First Time Sillytavern
Sillytavern sillytavern

02 Apr 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-02 18:16

Updated : 2026-04-13 18:39


NVD link : CVE-2026-34526

Mitre link : CVE-2026-34526

CVE.ORG link : CVE-2026-34526


JSON object : View

Products Affected

sillytavern

  • sillytavern
CWE
CWE-918

Server-Side Request Forgery (SSRF)