EUVD-2026-19973

| CVE-2026-39846 CRITICAL
2026-04-07 GitHub_M GHSA-phhp-9rm9-6gr2
9.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Apr 08, 2026 - 20:30 nvd
Patch available
Analysis Generated
Apr 07, 2026 - 22:16 vuln.today
EUVD ID Assigned
Apr 07, 2026 - 22:16 euvd
EUVD-2026-19973
CVE Published
Apr 07, 2026 - 21:34 nvd
CRITICAL 9.0

Description

SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious note synced to another user can trigger remote code execution in the SiYuan Electron desktop client. The root cause is that table caption content is stored without safe escaping and later unescaped into rendered HTML, creating a stored XSS sink. Because the desktop renderer runs with nodeIntegration enabled and contextIsolation disabled, attacker-controlled JavaScript executes with access to Node.js APIs. In practice, an attacker can import a crafted note into a synced workspace, wait for the victim to sync, and achieve code execution when the victim opens the note. This vulnerability is fixed in 3.6.4.

Analysis

Remote code execution in SiYuan Electron desktop client (prior to version 3.6.4) allows authenticated attackers to execute arbitrary code on victim systems through maliciously crafted notes synced across workspaces. The vulnerability chains a stored XSS flaw in table caption rendering with insecure Electron configuration (nodeIntegration enabled, contextIsolation disabled), elevating DOM-based script injection to full Node.js API access. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Audit all SiYuan installations across your organization and document current versions in use; immediately restrict syncing of notes from external or untrusted workspaces until patched. Within 7 days: Contact SiYuan development team for patch timeline confirmation; if patch releases, deploy version 3.6.4 or later to all affected systems. …

Sign in for detailed remediation steps.

Priority Score

45
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +45
POC: 0

Share

EUVD-2026-19973 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy