Moderate severityNVD Advisory· Published Mar 6, 2026· Updated Mar 9, 2026
SiYuan: Direct SQL Query API accessible to Reader-level users enables unauthorized database access
CVE-2026-29073
Description
SiYuan is a personal knowledge management system. Prior to version 3.6.0, the /api/query/sql lets a user run sql directly, but it only checks basic auth, not admin rights, any logged-in user, even readers, can run any sql query on the database. This issue has been patched in version 3.6.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/siyuan-note/siyuan/kernelGo | <= 0.0.0-20260113130602-4ba64580c29c | — |
Affected products
1- Range: < 3.6.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-jqwg-75qf-vmf9ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-29073ghsaADVISORY
- github.com/siyuan-note/siyuan/security/advisories/GHSA-jqwg-75qf-vmf9ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.