Go modules package
github.com/siyuan-note/siyuan/kernel
pkg:golang/github.com/siyuan-note/siyuan/kernel
Vulnerabilities (44)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-41894 | Hig | — | < 3.6.5 | 3.6.5 | Apr 24, 2026 | SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, the fix for CVE-2026-30869 only added a denylist check (IsSensitivePath) but did not address the root cause — a redundant url.PathUnescape() call in serveExport(). An authenticated attacker can use dou | |
| CVE-2026-40922 | Med | 5.4 | < 0.0.0-20260414013942-62eed37a3263 | 0.0.0-20260414013942-62eed37a3263 | Apr 17, 2026 | SiYuan is an open-source personal knowledge management system. In versions 3.6.1 through 3.6.3, a prior fix for XSS in bazaar README rendering (incomplete fix for CVE-2026-33066) enabled the Lute HTML sanitizer, but the sanitizer does not block iframe tags, and its URL-prefix blo | |
| CVE-2026-40318 | Hig | 8.5 | < 3.6.40.0.0-20260407035653-2f416e5253f1 | 3.6.40.0.0-20260407035653-2f416e5253f1 | Apr 16, 2026 | SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and prior, the /api/av/removeUnusedAttributeView endpoint constructs a filesystem path using the user-controlled id parameter without validation or path boundary enforcement. An attacker can inject p | |
| CVE-2026-40259 | Hig | 8.1 | < 0.0.0-20260407035653-2f416e5253f1 | 0.0.0-20260407035653-2f416e5253f1 | Apr 16, 2026 | SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, the /api/av/removeUnusedAttributeView endpoint is protected only by generic authentication that accepts publish-service RoleReader tokens. The handler passes a caller-controlled id directl | |
| CVE-2026-40107 | Med | 6.5 | < 0.0.0-20260407035653-2f416e5253f1 | 0.0.0-20260407035653-2f416e5253f1 | Apr 9, 2026 | SiYuan is a personal knowledge management system. Prior to 3.6.4, SiYuan configures Mermaid.js with securityLevel: "loose" and htmlLabels: true. In this mode, tags with src attributes survive Mermaid's internal DOMPurify and land in SVG blocks. The SVG is in | |
| CVE-2026-39846 | Cri | 9.0 | < 0.0.0-20260407035653-2f416e5253f1 | 0.0.0-20260407035653-2f416e5253f1 | Apr 7, 2026 | SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious note synced to another user can trigger remote code execution in the SiYuan Electron desktop client. The root cause is that table caption content is stored without safe escaping and later unescaped into | |
| CVE-2026-34605 | Med | 6.1 | < 0.0.0-20260330031106-f09953afc57a | 0.0.0-20260330031106-f09953afc57a | Mar 31, 2026 | SiYuan is a personal knowledge management system. From version 3.6.0 to before version 3.6.2, the SanitizeSVG function introduced in version 3.6.0 to fix XSS in the unauthenticated /api/icon/getDynamicIcon endpoint can be bypassed by using namespace-prefixed element names such as | |
| CVE-2026-34585 | Hig | 8.6 | < 0.0.0-20260329142331-918d1bd9f967 | 0.0.0-20260329142331-918d1bd9f967 | Mar 31, 2026 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, a vulnerability allows crafted block attribute values to bypass server-side attribute escaping when an HTML entity is mixed with raw special characters. An attacker can embed a malicious IAL value inside a | |
| CVE-2026-34453 | Hig | 7.5 | < 3.6.2 | 3.6.2 | Mar 31, 2026 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, the publish service exposes bookmarked blocks from password-protected documents to unauthenticated visitors. In publish/read-only mode, /api/bookmark/getBookmark filters bookmark results by calling FilterBl | |
| CVE-2026-34449 | Cri | 9.6 | < 3.6.2 | 3.6.2 | Mar 31, 2026 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, a malicious website can achieve Remote Code Execution (RCE) on any desktop running SiYuan by exploiting the permissive CORS policy (Access-Control-Allow-Origin: * + Access-Control-Allow-Private-Network: tru | |
| CVE-2026-34448 | Cri | 9.0 | < 3.6.2 | 3.6.2 | Mar 31, 2026 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, an attacker who can place a malicious URL in an Attribute View mAsse field can trigger stored XSS when a victim opens the Gallery or Kanban view with “Cover From -> Asset Field” enabled. The vulnerable code | |
| CVE-2026-33670 | — | <= 0.0.0-20260317012524-fe4523fff2c8 | — | Mar 26, 2026 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, the /api/file/readDir interface was used to traverse and retrieve the file names of all documents under a notebook. Version 3.6.2 patches the issue. | ||
| CVE-2026-33669 | — | <= 0.0.0-20260317012524-fe4523fff2c8 | — | Mar 26, 2026 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, document IDs were retrieved via the /api/file/readDir interface, and then the /api/block/getChildBlocks interface was used to view the content of all documents. Version 3.6.2 patches the issue. | ||
| CVE-2026-33476 | — | <= 0.0.0-20260317012524-fe4523fff2c8 | — | Mar 20, 2026 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Siyuan kernel exposes an unauthenticated file-serving endpoint under `/appearance/*filepath.` Due to improper path sanitization, attackers can perform directory traversal and read arbitrary files access | ||
| CVE-2026-33203 | — | < 3.6.2 | 3.6.2 | Mar 20, 2026 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, the SiYuan kernel WebSocket server accepts unauthenticated connections when a specific "auth keepalive" query parameter is present. After connection, incoming messages are parsed using unchecked type assert | ||
| CVE-2026-33194 | — | < 3.6.2 | 3.6.2 | Mar 20, 2026 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, the `IsSensitivePath()` function in `kernel/util/path.go` uses a denylist approach that was recently expanded (GHSA-h5vh-m7fg-w5h6, commit 9914fd1) but remains incomplete. Multiple security-relevant Linux d | ||
| CVE-2026-33067 | — | < 0.0.0-20260317012524-fe4523fff2c8 | 0.0.0-20260317012524-fe4523fff2c8 | Mar 20, 2026 | SiYuan is a personal knowledge management system. Versions 3.6.0 and below render package metadata fields (displayName, description) using template literals without HTML escaping. A malicious package author can inject arbitrary HTML/JavaScript into these fields, which executes au | ||
| CVE-2026-33066 | — | < 0.0.0-20260314111550-b382f50e1880 | 0.0.0-20260314111550-b382f50e1880 | Mar 20, 2026 | SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the backend renderREADME function uses lute.New() without calling SetSanitize(true), allowing raw HTML embedded in Markdown to pass through unmodified. The frontend then assigns the rendered HTML to in | ||
| CVE-2026-32938 | — | <= 0.0.0-20260313024916-fd6526133bb3 | — | Mar 20, 2026 | SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the /api/lute/html2BlockDOM on the desktop copies local files pointed to by file:// links in pasted HTML into the workspace assets directory without validating paths against a sensitive-path list. Toge | ||
| CVE-2026-32767 | — | <= 0.0.0-20260313024916-fd6526133bb3 | — | Mar 20, 2026 | SiYuan is a personal knowledge management system. Versions 3.6.0 and below contain an authorization bypass vulnerability in the /api/search/fullTextSearchBlock endpoint. When the method parameter is set to 2, the endpoint passes user-supplied input directly as a raw SQL statement |
- affected < 3.6.5fixed 3.6.5
SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, the fix for CVE-2026-30869 only added a denylist check (IsSensitivePath) but did not address the root cause — a redundant url.PathUnescape() call in serveExport(). An authenticated attacker can use dou
- affected < 0.0.0-20260414013942-62eed37a3263fixed 0.0.0-20260414013942-62eed37a3263
SiYuan is an open-source personal knowledge management system. In versions 3.6.1 through 3.6.3, a prior fix for XSS in bazaar README rendering (incomplete fix for CVE-2026-33066) enabled the Lute HTML sanitizer, but the sanitizer does not block iframe tags, and its URL-prefix blo
- affected < 3.6.40.0.0-20260407035653-2f416e5253f1fixed 3.6.40.0.0-20260407035653-2f416e5253f1
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and prior, the /api/av/removeUnusedAttributeView endpoint constructs a filesystem path using the user-controlled id parameter without validation or path boundary enforcement. An attacker can inject p
- affected < 0.0.0-20260407035653-2f416e5253f1fixed 0.0.0-20260407035653-2f416e5253f1
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, the /api/av/removeUnusedAttributeView endpoint is protected only by generic authentication that accepts publish-service RoleReader tokens. The handler passes a caller-controlled id directl
- affected < 0.0.0-20260407035653-2f416e5253f1fixed 0.0.0-20260407035653-2f416e5253f1
SiYuan is a personal knowledge management system. Prior to 3.6.4, SiYuan configures Mermaid.js with securityLevel: "loose" and htmlLabels: true. In this mode, tags with src attributes survive Mermaid's internal DOMPurify and land in SVG blocks. The SVG is in
- affected < 0.0.0-20260407035653-2f416e5253f1fixed 0.0.0-20260407035653-2f416e5253f1
SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious note synced to another user can trigger remote code execution in the SiYuan Electron desktop client. The root cause is that table caption content is stored without safe escaping and later unescaped into
- affected < 0.0.0-20260330031106-f09953afc57afixed 0.0.0-20260330031106-f09953afc57a
SiYuan is a personal knowledge management system. From version 3.6.0 to before version 3.6.2, the SanitizeSVG function introduced in version 3.6.0 to fix XSS in the unauthenticated /api/icon/getDynamicIcon endpoint can be bypassed by using namespace-prefixed element names such as
- affected < 0.0.0-20260329142331-918d1bd9f967fixed 0.0.0-20260329142331-918d1bd9f967
SiYuan is a personal knowledge management system. Prior to version 3.6.2, a vulnerability allows crafted block attribute values to bypass server-side attribute escaping when an HTML entity is mixed with raw special characters. An attacker can embed a malicious IAL value inside a
- affected < 3.6.2fixed 3.6.2
SiYuan is a personal knowledge management system. Prior to version 3.6.2, the publish service exposes bookmarked blocks from password-protected documents to unauthenticated visitors. In publish/read-only mode, /api/bookmark/getBookmark filters bookmark results by calling FilterBl
- affected < 3.6.2fixed 3.6.2
SiYuan is a personal knowledge management system. Prior to version 3.6.2, a malicious website can achieve Remote Code Execution (RCE) on any desktop running SiYuan by exploiting the permissive CORS policy (Access-Control-Allow-Origin: * + Access-Control-Allow-Private-Network: tru
- affected < 3.6.2fixed 3.6.2
SiYuan is a personal knowledge management system. Prior to version 3.6.2, an attacker who can place a malicious URL in an Attribute View mAsse field can trigger stored XSS when a victim opens the Gallery or Kanban view with “Cover From -> Asset Field” enabled. The vulnerable code
- CVE-2026-33670Mar 26, 2026affected <= 0.0.0-20260317012524-fe4523fff2c8
SiYuan is a personal knowledge management system. Prior to version 3.6.2, the /api/file/readDir interface was used to traverse and retrieve the file names of all documents under a notebook. Version 3.6.2 patches the issue.
- CVE-2026-33669Mar 26, 2026affected <= 0.0.0-20260317012524-fe4523fff2c8
SiYuan is a personal knowledge management system. Prior to version 3.6.2, document IDs were retrieved via the /api/file/readDir interface, and then the /api/block/getChildBlocks interface was used to view the content of all documents. Version 3.6.2 patches the issue.
- CVE-2026-33476Mar 20, 2026affected <= 0.0.0-20260317012524-fe4523fff2c8
SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Siyuan kernel exposes an unauthenticated file-serving endpoint under `/appearance/*filepath.` Due to improper path sanitization, attackers can perform directory traversal and read arbitrary files access
- CVE-2026-33203Mar 20, 2026affected < 3.6.2fixed 3.6.2
SiYuan is a personal knowledge management system. Prior to version 3.6.2, the SiYuan kernel WebSocket server accepts unauthenticated connections when a specific "auth keepalive" query parameter is present. After connection, incoming messages are parsed using unchecked type assert
- CVE-2026-33194Mar 20, 2026affected < 3.6.2fixed 3.6.2
SiYuan is a personal knowledge management system. Prior to version 3.6.2, the `IsSensitivePath()` function in `kernel/util/path.go` uses a denylist approach that was recently expanded (GHSA-h5vh-m7fg-w5h6, commit 9914fd1) but remains incomplete. Multiple security-relevant Linux d
- CVE-2026-33067Mar 20, 2026affected < 0.0.0-20260317012524-fe4523fff2c8fixed 0.0.0-20260317012524-fe4523fff2c8
SiYuan is a personal knowledge management system. Versions 3.6.0 and below render package metadata fields (displayName, description) using template literals without HTML escaping. A malicious package author can inject arbitrary HTML/JavaScript into these fields, which executes au
- CVE-2026-33066Mar 20, 2026affected < 0.0.0-20260314111550-b382f50e1880fixed 0.0.0-20260314111550-b382f50e1880
SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the backend renderREADME function uses lute.New() without calling SetSanitize(true), allowing raw HTML embedded in Markdown to pass through unmodified. The frontend then assigns the rendered HTML to in
- CVE-2026-32938Mar 20, 2026affected <= 0.0.0-20260313024916-fd6526133bb3
SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the /api/lute/html2BlockDOM on the desktop copies local files pointed to by file:// links in pasted HTML into the workspace assets directory without validating paths against a sensitive-path list. Toge
- CVE-2026-32767Mar 20, 2026affected <= 0.0.0-20260313024916-fd6526133bb3
SiYuan is a personal knowledge management system. Versions 3.6.0 and below contain an authorization bypass vulnerability in the /api/search/fullTextSearchBlock endpoint. When the method parameter is set to 2, the endpoint passes user-supplied input directly as a raw SQL statement
Page 1 of 3