CVE-2026-39846
Description
SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious note synced to another user can trigger remote code execution in the SiYuan Electron desktop client. The root cause is that table caption content is stored without safe escaping and later unescaped into rendered HTML, creating a stored XSS sink. Because the desktop renderer runs with nodeIntegration enabled and contextIsolation disabled, attacker-controlled JavaScript executes with access to Node.js APIs. In practice, an attacker can import a crafted note into a synced workspace, wait for the victim to sync, and achieve code execution when the victim opens the note. This vulnerability is fixed in 3.6.4.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/siyuan-note/siyuan/kernelGo | < 0.0.0-20260407035653-2f416e5253f1 | 0.0.0-20260407035653-2f416e5253f1 |
Affected products
1- Range: < 0.0.0-20260407035653-2f416e5253f1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/siyuan-note/siyuan/security/advisories/GHSA-phhp-9rm9-6gr2nvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-phhp-9rm9-6gr2ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-39846ghsaADVISORY
News mentions
0No linked articles in our index yet.