Metrics
Affected Vendors & Products
Fri, 20 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:sillytavern:sillytavern:*:*:*:*:*:node.js:*:* | |
| Metrics |
cvssV3_1
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sillytavern
Sillytavern sillytavern |
|
| Vendors & Products |
Sillytavern
Sillytavern sillytavern |
Thu, 19 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. In versions prior to 1.16.0, a Server-Side Request Forgery (SSRF) vulnerability in the asset download endpoint allows authenticated users to make arbitrary HTTP requests from the server and read the full response body, enabling access to internal services, cloud metadata, and private network resources. The vulnerability has been patched in the version 1.16.0 by introducing a whitelist domain check for asset download requests. It can be reviewed and customized by editing the `whitelistImportDomains` array in the `config.yaml` file. | |
| Title | SillyTavern has Server-Side Request Forgery (SSRF) via Asset Download Endpoint that Allows Reading Internal Services | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-20T19:56:45.423Z
Reserved: 2026-02-12T17:10:53.415Z
Link: CVE-2026-26286
Updated: 2026-02-20T19:56:38.932Z
Status : Analyzed
Published: 2026-02-19T21:18:31.670
Modified: 2026-02-20T19:45:52.563
Link: CVE-2026-26286
No data.
OpenCVE Enrichment
Updated: 2026-02-20T09:53:57Z