Siyuan

16 CVEs product

Monthly

CVE-2026-32110 HIGH PATCH This Week

High severity vulnerability in SiYuan Note. # The `/api/network/forwardProxy` endpoint allows authenticated users to make arbitrary HTTP requests from the server. The endpoint accepts a user-controlled URL and makes HTTP requests to it, returning the full response body and headers. There is no URL validation to prevent requests to internal networks, localhost, or cloud metadata services.

SSRF Siyuan
NVD GitHub VulDB
CVSS 3.1
8.3
EPSS
0.0%
CVE-2026-31809 MEDIUM POC PATCH This Month

SiYuan's SVG sanitizer fails to properly filter malicious href attributes when whitespace characters are inserted into javascript: URLs, allowing reflected cross-site scripting on the unauthenticated /api/icon/getDynamicIcon endpoint. Public exploit code exists for this vulnerability, which bypasses the previous fix for CVE-2026-29183. Attackers can inject executable JavaScript to target unauthenticated users of SiYuan versions prior to 3.5.10.

XSS Siyuan
NVD GitHub VulDB
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-31807 MEDIUM POC PATCH This Month

Reflected XSS in SiYuan's /api/icon/getDynamicIcon endpoint allows unauthenticated attackers to inject malicious JavaScript through SVG animation elements that bypass the sanitizer's static filters. The vulnerability exists because the SVG sanitizer blocks script tags and event handlers but fails to restrict <animate> and <set> elements, which can dynamically modify attributes at runtime to execute code. Public exploit code exists and patches are not yet available for affected versions prior to 3.5.10.

XSS Siyuan
NVD GitHub VulDB
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-30869 CRITICAL PATCH Act Now

SiYuan prior to 3.5.10 has a path traversal vulnerability enabling arbitrary file access through crafted API requests.

RCE Path Traversal Siyuan
NVD GitHub VulDB
CVSS 3.1
9.3
EPSS
0.4%
CVE-2026-30926 HIGH This Week

SiYuan Note prior to version 3.5.10 contains an insufficient authorization flaw in the /api/block/appendHeadingChildren endpoint that allows authenticated users with read-only (RoleReader) privileges to modify notebook content by appending blocks to documents. The vulnerability exists because the endpoint applies only basic authentication checks instead of enforcing stricter administrative or read-only restrictions. Affected users should upgrade to version 3.5.10 or later, as no workaround is currently available and exploitation requires only network access and valid read-only credentials.

Privilege Escalation Authentication Bypass Siyuan
NVD GitHub
CVSS 3.1
7.1
EPSS
0.0%
CVE-2026-29183 CRITICAL POC PATCH Act Now

Reflected XSS in SiYuan knowledge management before 3.5.9.

XSS Siyuan
NVD GitHub
CVSS 3.1
9.3
EPSS
0.0%
CVE-2026-29073 HIGH POC This Week

SQL injection in SiYuan prior to version 3.6.0 allows any authenticated user, including those with read-only access, to execute arbitrary database queries through the /api/query/sql endpoint due to insufficient authorization checks. Public exploit code exists for this vulnerability, enabling attackers to extract sensitive data or modify the knowledge base contents. No patch is currently available for affected versions.

SQLi Siyuan
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-25992 HIGH POC This Week

Unauthenticated attackers can read sensitive configuration files from SiYuan knowledge management systems prior to version 3.5.5 by exploiting case-sensitivity bypass in file access controls on Windows and other case-insensitive filesystems. The /api/file/getFile endpoint fails to properly validate mixed-case path traversal attempts, allowing unauthorized access to protected data. Public exploit code exists for this vulnerability, and no patch is currently available.

Windows Siyuan
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-25647 MEDIUM POC PATCH This Month

Stored XSS in Lute's Markdown rendering engine (versions 1.7.6 and earlier) allows authenticated attackers to inject malicious JavaScript into notes that executes when other users view the rendered content. SiYuan and other applications using vulnerable Lute versions are affected, with public exploit code available. A patch is available and should be applied to prevent session hijacking and credential theft.

Golang XSS Siyuan
NVD GitHub
CVSS 3.1
4.6
EPSS
0.0%
CVE-2026-25539 CRITICAL POC PATCH Act Now

SiYuan knowledge management system prior to 3.5.5 has a path traversal in /api/file/copyFile allowing arbitrary file operations on the server.

Ssh RCE Siyuan
NVD GitHub
CVSS 3.1
9.1
EPSS
0.6%
CVE-2026-23852 CRITICAL POC PATCH Act Now

SiYuan personal knowledge management system prior to 3.5.4 has a stored XSS vulnerability (CVSS 9.6) that allows code execution through crafted knowledge base entries.

RCE XSS Siyuan
NVD GitHub
CVSS 3.1
9.6
EPSS
0.2%
CVE-2026-23851 MEDIUM POC PATCH This Month

SiYuan knowledge management system versions before 3.5.4 allow authenticated users to copy arbitrary files from the server filesystem into the application workspace due to insufficient path validation in the /api/file/globalCopyFiles endpoint. An attacker with valid credentials can exploit this path traversal vulnerability to read sensitive files and escalate privileges within the application. Public exploit code exists for this medium-severity vulnerability, though a patch is available.

Golang Siyuan Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-23850 HIGH POC PATCH This Week

SiYuan versions before 3.5.4 allow unauthenticated remote attackers to read arbitrary files on the server through improper HTML rendering in the markdown feature. Public exploit code exists for this vulnerability, which has a CVSS score of 7.5. The vulnerability has been patched in version 3.5.4 and later.

Path Traversal Siyuan Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-23847 MEDIUM POC PATCH This Month

Reflected XSS in SiYuan's /api/icon/getDynamicIcon endpoint allows attackers to inject malicious JavaScript through unescaped SVG content in dynamically generated icon images. An unauthenticated attacker can craft a malicious link that, when clicked by a victim, executes arbitrary scripts in the context of the SiYuan application. Public exploit code exists for versions prior to 3.5.4, which contains the necessary patches.

XSS Siyuan Suse
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-23645 MEDIUM POC PATCH This Month

SiYuan prior to version 3.5.4-dev2 fails to sanitize SVG file uploads, allowing authenticated attackers to embed malicious JavaScript that executes when other users view the files. Public exploit code exists for this stored XSS vulnerability, which can compromise user sessions and access sensitive knowledge management data. The vulnerability affects self-hosted instances where users can upload SVG content from untrusted sources.

XSS Siyuan Suse
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2025-21609 HIGH POC PATCH This Week

SiYuan is self-hosted, open source personal knowledge management software. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Siyuan Suse
NVD GitHub
CVSS 4.0
8.7
EPSS
0.4%
CVE-2026-32110
EPSS 0% CVSS 8.3
HIGH PATCH This Week

High severity vulnerability in SiYuan Note. # The `/api/network/forwardProxy` endpoint allows authenticated users to make arbitrary HTTP requests from the server. The endpoint accepts a user-controlled URL and makes HTTP requests to it, returning the full response body and headers. There is no URL validation to prevent requests to internal networks, localhost, or cloud metadata services.

SSRF Siyuan
NVD GitHub VulDB
CVE-2026-31809
EPSS 0% CVSS 6.1
MEDIUM POC PATCH This Month

SiYuan's SVG sanitizer fails to properly filter malicious href attributes when whitespace characters are inserted into javascript: URLs, allowing reflected cross-site scripting on the unauthenticated /api/icon/getDynamicIcon endpoint. Public exploit code exists for this vulnerability, which bypasses the previous fix for CVE-2026-29183. Attackers can inject executable JavaScript to target unauthenticated users of SiYuan versions prior to 3.5.10.

XSS Siyuan
NVD GitHub VulDB
CVE-2026-31807
EPSS 0% CVSS 6.1
MEDIUM POC PATCH This Month

Reflected XSS in SiYuan's /api/icon/getDynamicIcon endpoint allows unauthenticated attackers to inject malicious JavaScript through SVG animation elements that bypass the sanitizer's static filters. The vulnerability exists because the SVG sanitizer blocks script tags and event handlers but fails to restrict <animate> and <set> elements, which can dynamically modify attributes at runtime to execute code. Public exploit code exists and patches are not yet available for affected versions prior to 3.5.10.

XSS Siyuan
NVD GitHub VulDB
CVE-2026-30869
EPSS 0% CVSS 9.3
CRITICAL PATCH Act Now

SiYuan prior to 3.5.10 has a path traversal vulnerability enabling arbitrary file access through crafted API requests.

RCE Path Traversal Siyuan
NVD GitHub VulDB
CVE-2026-30926
EPSS 0% CVSS 7.1
HIGH This Week

SiYuan Note prior to version 3.5.10 contains an insufficient authorization flaw in the /api/block/appendHeadingChildren endpoint that allows authenticated users with read-only (RoleReader) privileges to modify notebook content by appending blocks to documents. The vulnerability exists because the endpoint applies only basic authentication checks instead of enforcing stricter administrative or read-only restrictions. Affected users should upgrade to version 3.5.10 or later, as no workaround is currently available and exploitation requires only network access and valid read-only credentials.

Privilege Escalation Authentication Bypass Siyuan
NVD GitHub
CVE-2026-29183
EPSS 0% CVSS 9.3
CRITICAL POC PATCH Act Now

Reflected XSS in SiYuan knowledge management before 3.5.9.

XSS Siyuan
NVD GitHub
CVE-2026-29073
EPSS 0% CVSS 8.8
HIGH POC This Week

SQL injection in SiYuan prior to version 3.6.0 allows any authenticated user, including those with read-only access, to execute arbitrary database queries through the /api/query/sql endpoint due to insufficient authorization checks. Public exploit code exists for this vulnerability, enabling attackers to extract sensitive data or modify the knowledge base contents. No patch is currently available for affected versions.

SQLi Siyuan
NVD GitHub
CVE-2026-25992
EPSS 0% CVSS 7.5
HIGH POC This Week

Unauthenticated attackers can read sensitive configuration files from SiYuan knowledge management systems prior to version 3.5.5 by exploiting case-sensitivity bypass in file access controls on Windows and other case-insensitive filesystems. The /api/file/getFile endpoint fails to properly validate mixed-case path traversal attempts, allowing unauthorized access to protected data. Public exploit code exists for this vulnerability, and no patch is currently available.

Windows Siyuan
NVD GitHub
CVE-2026-25647
EPSS 0% CVSS 4.6
MEDIUM POC PATCH This Month

Stored XSS in Lute's Markdown rendering engine (versions 1.7.6 and earlier) allows authenticated attackers to inject malicious JavaScript into notes that executes when other users view the rendered content. SiYuan and other applications using vulnerable Lute versions are affected, with public exploit code available. A patch is available and should be applied to prevent session hijacking and credential theft.

Golang XSS Siyuan
NVD GitHub
CVE-2026-25539
EPSS 1% CVSS 9.1
CRITICAL POC PATCH Act Now

SiYuan knowledge management system prior to 3.5.5 has a path traversal in /api/file/copyFile allowing arbitrary file operations on the server.

Ssh RCE Siyuan
NVD GitHub
CVE-2026-23852
EPSS 0% CVSS 9.6
CRITICAL POC PATCH Act Now

SiYuan personal knowledge management system prior to 3.5.4 has a stored XSS vulnerability (CVSS 9.6) that allows code execution through crafted knowledge base entries.

RCE XSS Siyuan
NVD GitHub
CVE-2026-23851
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

SiYuan knowledge management system versions before 3.5.4 allow authenticated users to copy arbitrary files from the server filesystem into the application workspace due to insufficient path validation in the /api/file/globalCopyFiles endpoint. An attacker with valid credentials can exploit this path traversal vulnerability to read sensitive files and escalate privileges within the application. Public exploit code exists for this medium-severity vulnerability, though a patch is available.

Golang Siyuan Suse
NVD GitHub
CVE-2026-23850
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

SiYuan versions before 3.5.4 allow unauthenticated remote attackers to read arbitrary files on the server through improper HTML rendering in the markdown feature. Public exploit code exists for this vulnerability, which has a CVSS score of 7.5. The vulnerability has been patched in version 3.5.4 and later.

Path Traversal Siyuan Suse
NVD GitHub
CVE-2026-23847
EPSS 0% CVSS 6.1
MEDIUM POC PATCH This Month

Reflected XSS in SiYuan's /api/icon/getDynamicIcon endpoint allows attackers to inject malicious JavaScript through unescaped SVG content in dynamically generated icon images. An unauthenticated attacker can craft a malicious link that, when clicked by a victim, executes arbitrary scripts in the context of the SiYuan application. Public exploit code exists for versions prior to 3.5.4, which contains the necessary patches.

XSS Siyuan Suse
NVD GitHub
CVE-2026-23645
EPSS 0% CVSS 6.1
MEDIUM POC PATCH This Month

SiYuan prior to version 3.5.4-dev2 fails to sanitize SVG file uploads, allowing authenticated attackers to embed malicious JavaScript that executes when other users view the files. Public exploit code exists for this stored XSS vulnerability, which can compromise user sessions and access sensitive knowledge management data. The vulnerability affects self-hosted instances where users can upload SVG content from untrusted sources.

XSS Siyuan Suse
NVD GitHub
CVE-2025-21609
EPSS 0% CVSS 8.7
HIGH POC PATCH This Week

SiYuan is self-hosted, open source personal knowledge management software. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Siyuan Suse
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy