High severityNVD Advisory· Published Mar 20, 2026· Updated Mar 23, 2026
SiYuan has an Unauthenticated WebSocket DoS via Auth Keepalive Bypass
CVE-2026-33203
Description
SiYuan is a personal knowledge management system. Prior to version 3.6.2, the SiYuan kernel WebSocket server accepts unauthenticated connections when a specific "auth keepalive" query parameter is present. After connection, incoming messages are parsed using unchecked type assertions on attacker-controlled JSON. A remote attacker can send malformed messages that trigger a runtime panic, potentially crashing the kernel process and causing denial of service. Version 3.6.2 fixes the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/siyuan-note/siyuan/kernelGo | < 3.6.2 | 3.6.2 |
Affected products
1- Range: < 3.6.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-3g9h-9hp4-654vghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33203ghsaADVISORY
- github.com/siyuan-note/siyuan/security/advisories/GHSA-3g9h-9hp4-654vghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.