CVE-2025-59159
BaseFortify
Publication date: 2025-10-06
Last updated on: 2025-10-08
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sillytavern | sillytavern | 1.13.3 |
| sillytavern | sillytavern | 1.13.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-346 | The product does not properly verify that the source of data or communication is valid. |
| CWE-940 | The product establishes a communication channel to handle an incoming request that has been initiated by an actor, but it does not properly verify that the request is coming from the expected origin. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-59159 is a DNS rebinding vulnerability in the SillyTavern web user interface versions prior to 1.13.4. This vulnerability allows attackers to bypass browser security policies by tricking the victim's browser into resolving the SillyTavern server's DNS to localhost (127.0.0.1). As a result, attackers can perform unauthorized actions such as installing malicious extensions, reading user chats, and injecting arbitrary HTML for phishing attacks. The root cause is improper validation of the origin and host headers, allowing malicious requests to be accepted by the server. The vulnerability is patched in version 1.13.4 by adding a host whitelisting feature that validates incoming HTTP request hostnames against a configured list of allowed hosts. [4, 3]
How can this vulnerability impact me? :
This vulnerability can have severe impacts including unauthorized remote attackers gaining full control over a SillyTavern instance running locally or on a local network. Attackers can read sensitive user chats, inject malicious HTML content to conduct phishing attacks, install harmful extensions, and compromise the confidentiality, integrity, and availability of the system. Since no privileges are required and only user interaction (visiting a malicious website) is needed, the risk is high. Exploitation can lead to data loss, unauthorized data access, and potential system compromise. [4, 1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
To detect exploitation attempts or suspicious activity related to CVE-2025-59159 on your SillyTavern instance, you should regularly monitor the server's access logs and console output for unusual incoming requests, especially those with unexpected Host headers or originating from untrusted IP addresses. The host whitelisting feature can be enabled in scan mode (`hostWhitelist.scan`) to log warnings about unrecognized hosts without blocking them, helping identify potential DNS rebinding attempts. Checking the access.log file and server console logs for repeated requests from suspicious sources or unusual user agents is recommended. While no specific commands are provided in the resources, typical commands to view logs on a Linux system might include `tail -f access.log` or `journalctl -u sillytavern.service` if running as a service. Additionally, network monitoring tools or packet capture utilities (e.g., tcpdump, Wireshark) can be used to observe traffic patterns targeting the SillyTavern server port (default 8000). [1, 3, 4]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps for CVE-2025-59159 include: 1) Upgrade SillyTavern to version 1.13.4 or later, where the vulnerability is patched. 2) Enable host whitelisting by setting `hostWhitelist.enabled` to true in the `config.yaml` file or by setting the environment variable `SILLYTAVERN_HOSTWHITELIST_ENABLED=true`. Configure the `hostWhitelist.hosts` list to include only trusted hostnames. 3) Use SSL/TLS encryption for your SillyTavern server, either via built-in SSL support or by deploying a reverse proxy (e.g., Traefik or Caddy) with proper TLS certificates. 4) Restrict network access using firewalls and IP whitelisting to limit connections to trusted IP ranges. 5) Enable basic authentication or external authentication services to protect access. 6) Avoid exposing the SillyTavern instance directly to the public internet without additional protections such as VPNs or tunneling services (Cloudflare Zero Trust, ngrok, Tailscale). 7) Regularly monitor logs for suspicious activity. These steps collectively reduce the risk of DNS rebinding attacks and unauthorized access. [1, 2, 3, 4, 5]