VYPR

Go modules package

github.com/siyuan-note/siyuan/kernel

pkg:golang/github.com/siyuan-note/siyuan/kernel

Vulnerabilities (44)

  • CVE-2026-41894HigApr 24, 2026
    affected < 3.6.5fixed 3.6.5

    SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, the fix for CVE-2026-30869 only added a denylist check (IsSensitivePath) but did not address the root cause — a redundant url.PathUnescape() call in serveExport(). An authenticated attacker can use dou

  • CVE-2026-40922MedApr 17, 2026
    affected < 0.0.0-20260414013942-62eed37a3263fixed 0.0.0-20260414013942-62eed37a3263

    SiYuan is an open-source personal knowledge management system. In versions 3.6.1 through 3.6.3, a prior fix for XSS in bazaar README rendering (incomplete fix for CVE-2026-33066) enabled the Lute HTML sanitizer, but the sanitizer does not block iframe tags, and its URL-prefix blo

  • CVE-2026-40318HigApr 16, 2026
    affected < 3.6.40.0.0-20260407035653-2f416e5253f1fixed 3.6.40.0.0-20260407035653-2f416e5253f1

    SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and prior, the /api/av/removeUnusedAttributeView endpoint constructs a filesystem path using the user-controlled id parameter without validation or path boundary enforcement. An attacker can inject p

  • CVE-2026-40259HigApr 16, 2026
    affected < 0.0.0-20260407035653-2f416e5253f1fixed 0.0.0-20260407035653-2f416e5253f1

    SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, the /api/av/removeUnusedAttributeView endpoint is protected only by generic authentication that accepts publish-service RoleReader tokens. The handler passes a caller-controlled id directl

  • CVE-2026-40107MedApr 9, 2026
    affected < 0.0.0-20260407035653-2f416e5253f1fixed 0.0.0-20260407035653-2f416e5253f1

    SiYuan is a personal knowledge management system. Prior to 3.6.4, SiYuan configures Mermaid.js with securityLevel: "loose" and htmlLabels: true. In this mode, tags with src attributes survive Mermaid's internal DOMPurify and land in SVG blocks. The SVG is in

  • CVE-2026-39846CriApr 7, 2026
    affected < 0.0.0-20260407035653-2f416e5253f1fixed 0.0.0-20260407035653-2f416e5253f1

    SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious note synced to another user can trigger remote code execution in the SiYuan Electron desktop client. The root cause is that table caption content is stored without safe escaping and later unescaped into

  • CVE-2026-34605MedMar 31, 2026
    affected < 0.0.0-20260330031106-f09953afc57afixed 0.0.0-20260330031106-f09953afc57a

    SiYuan is a personal knowledge management system. From version 3.6.0 to before version 3.6.2, the SanitizeSVG function introduced in version 3.6.0 to fix XSS in the unauthenticated /api/icon/getDynamicIcon endpoint can be bypassed by using namespace-prefixed element names such as

  • CVE-2026-34585HigMar 31, 2026
    affected < 0.0.0-20260329142331-918d1bd9f967fixed 0.0.0-20260329142331-918d1bd9f967

    SiYuan is a personal knowledge management system. Prior to version 3.6.2, a vulnerability allows crafted block attribute values to bypass server-side attribute escaping when an HTML entity is mixed with raw special characters. An attacker can embed a malicious IAL value inside a

  • CVE-2026-34453HigMar 31, 2026
    affected < 3.6.2fixed 3.6.2

    SiYuan is a personal knowledge management system. Prior to version 3.6.2, the publish service exposes bookmarked blocks from password-protected documents to unauthenticated visitors. In publish/read-only mode, /api/bookmark/getBookmark filters bookmark results by calling FilterBl

  • CVE-2026-34449CriMar 31, 2026
    affected < 3.6.2fixed 3.6.2

    SiYuan is a personal knowledge management system. Prior to version 3.6.2, a malicious website can achieve Remote Code Execution (RCE) on any desktop running SiYuan by exploiting the permissive CORS policy (Access-Control-Allow-Origin: * + Access-Control-Allow-Private-Network: tru

  • CVE-2026-34448CriMar 31, 2026
    affected < 3.6.2fixed 3.6.2

    SiYuan is a personal knowledge management system. Prior to version 3.6.2, an attacker who can place a malicious URL in an Attribute View mAsse field can trigger stored XSS when a victim opens the Gallery or Kanban view with “Cover From -> Asset Field” enabled. The vulnerable code

  • CVE-2026-33670Mar 26, 2026
    affected <= 0.0.0-20260317012524-fe4523fff2c8

    SiYuan is a personal knowledge management system. Prior to version 3.6.2, the /api/file/readDir interface was used to traverse and retrieve the file names of all documents under a notebook. Version 3.6.2 patches the issue.

  • CVE-2026-33669Mar 26, 2026
    affected <= 0.0.0-20260317012524-fe4523fff2c8

    SiYuan is a personal knowledge management system. Prior to version 3.6.2, document IDs were retrieved via the /api/file/readDir interface, and then the /api/block/getChildBlocks interface was used to view the content of all documents. Version 3.6.2 patches the issue.

  • CVE-2026-33476Mar 20, 2026
    affected <= 0.0.0-20260317012524-fe4523fff2c8

    SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Siyuan kernel exposes an unauthenticated file-serving endpoint under `/appearance/*filepath.` Due to improper path sanitization, attackers can perform directory traversal and read arbitrary files access

  • CVE-2026-33203Mar 20, 2026
    affected < 3.6.2fixed 3.6.2

    SiYuan is a personal knowledge management system. Prior to version 3.6.2, the SiYuan kernel WebSocket server accepts unauthenticated connections when a specific "auth keepalive" query parameter is present. After connection, incoming messages are parsed using unchecked type assert

  • CVE-2026-33194Mar 20, 2026
    affected < 3.6.2fixed 3.6.2

    SiYuan is a personal knowledge management system. Prior to version 3.6.2, the `IsSensitivePath()` function in `kernel/util/path.go` uses a denylist approach that was recently expanded (GHSA-h5vh-m7fg-w5h6, commit 9914fd1) but remains incomplete. Multiple security-relevant Linux d

  • CVE-2026-33067Mar 20, 2026
    affected < 0.0.0-20260317012524-fe4523fff2c8fixed 0.0.0-20260317012524-fe4523fff2c8

    SiYuan is a personal knowledge management system. Versions 3.6.0 and below render package metadata fields (displayName, description) using template literals without HTML escaping. A malicious package author can inject arbitrary HTML/JavaScript into these fields, which executes au

  • CVE-2026-33066Mar 20, 2026
    affected < 0.0.0-20260314111550-b382f50e1880fixed 0.0.0-20260314111550-b382f50e1880

    SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the backend renderREADME function uses lute.New() without calling SetSanitize(true), allowing raw HTML embedded in Markdown to pass through unmodified. The frontend then assigns the rendered HTML to in

  • CVE-2026-32938Mar 20, 2026
    affected <= 0.0.0-20260313024916-fd6526133bb3

    SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the /api/lute/html2BlockDOM on the desktop copies local files pointed to by file:// links in pasted HTML into the workspace assets directory without validating paths against a sensitive-path list. Toge

  • CVE-2026-32767Mar 20, 2026
    affected <= 0.0.0-20260313024916-fd6526133bb3

    SiYuan is a personal knowledge management system. Versions 3.6.0 and below contain an authorization bypass vulnerability in the /api/search/fullTextSearchBlock endpoint. When the method parameter is set to 2, the endpoint passes user-supplied input directly as a raw SQL statement

Page 1 of 3