Go modules package
github.com/siyuan-note/siyuan/kernel
pkg:golang/github.com/siyuan-note/siyuan/kernel
Vulnerabilities (44)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-32815 | — | <= 0.0.0-20260313024916-fd6526133bb3 | — | Mar 19, 2026 | SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the WebSocket endpoint (/ws) allows unauthenticated connections when specific URL parameters are provided (?app=siyuan&id=auth&type=auth). This bypass, intended for the login page to keep the kernel al | ||
| CVE-2026-32751 | — | <= 0.0.0-20260313024916-fd6526133bb3 | — | Mar 19, 2026 | SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the mobile file tree (MobileFiles.ts) renders notebook names via innerHTML without HTML escaping when processing renamenotebook WebSocket events. The desktop version (Files.ts) properly uses escapeHtml | ||
| CVE-2026-32749 | — | <= 0.0.0-20260313024916-fd6526133bb3 | — | Mar 19, 2026 | SiYuan is a personal knowledge management system. In versions 3.6.0 and below, POST /api/import/importSY and POST /api/import/importZipMd write uploaded archives to a path derived from the multipart filename field without sanitization, allowing an admin to write files to arbitrar | ||
| CVE-2026-32747 | — | <= 0.0.0-20260313024916-fd6526133bb3 | — | Mar 19, 2026 | SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the globalCopyFiles API eads source files using filepath.Abs() with no workspace boundary check, relying solely on util.IsSensitivePath() whose blocklist omits /proc/, /run/secrets/, and home director | ||
| CVE-2026-32704 | — | < 3.6.1 | 3.6.1 | Mar 13, 2026 | SiYuan is a personal knowledge management system. Prior to 3.6.1, POST /api/template/renderSprig lacks model.CheckAdminRole, allowing any authenticated user to execute arbitrary SQL queries against the SiYuan workspace database and exfiltrate all note content, metadata, and custo | ||
| CVE-2026-32110 | — | < 3.6.0 | 3.6.0 | Mar 11, 2026 | SiYuan is a personal knowledge management system. Prior to 3.6.0, the /api/network/forwardProxy endpoint allows authenticated users to make arbitrary HTTP requests from the server. The endpoint accepts a user-controlled URL and makes HTTP requests to it, returning the full respon | ||
| CVE-2026-31809 | — | < 0.0.0-20260310025236-297bd526708f | 0.0.0-20260310025236-297bd526708f | Mar 10, 2026 | SiYuan is a personal knowledge management system. Prior to 3.5.10, SiYuan's SVG sanitizer (SanitizeSVG) checks href attributes for the javascript: prefix using strings.HasPrefix(). However, inserting ASCII tab ( ), newline ( ), or carriage return ( ) characters inside | ||
| CVE-2026-31807 | — | < 0.0.0-20260310025236-297bd526708f | 0.0.0-20260310025236-297bd526708f | Mar 10, 2026 | SiYuan is a personal knowledge management system. Prior to 3.5.10, SiYuan's SVG sanitizer (SanitizeSVG) blocks dangerous elements (, , ) and removes on* event handlers and javascript: in href attributes. However, it does NOT block SVG animation elem | ||
| CVE-2026-30869 | — | < 3.5.10 | 3.5.10 | Mar 9, 2026 | SiYuan is a personal knowledge management system. Prior to 3.5.10, a path traversal vulnerability in the /export endpoint allows an attacker to read arbitrary files from the server filesystem. By exploiting double‑encoded traversal sequences, an attacker can access sensitive file | ||
| CVE-2026-30926 | — | <= 0.0.0-20260304035530-d03ebdec8279 | — | Mar 9, 2026 | SiYuan is a personal knowledge management system. Prior to 3.5.10, a privilege escalation vulnerability exists in the publish service of SiYuan Note that allows low-privilege publish accounts (RoleReader) to modify notebook content via the /api/block/appendHeadingChildren API end | ||
| CVE-2026-29183 | — | < 0.0.0-20260304034809-d68bd5a79391 | 0.0.0-20260304034809-d68bd5a79391 | Mar 6, 2026 | SiYuan is a personal knowledge management system. Prior to version 3.5.9, an unauthenticated reflected XSS vulnerability exists in the dynamic icon API endpoint "GET /api/icon/getDynamicIcon" when type=8, attacker-controlled content is embedded into SVG output without escaping. B | ||
| CVE-2026-29073 | — | <= 0.0.0-20260113130602-4ba64580c29c | — | Mar 6, 2026 | SiYuan is a personal knowledge management system. Prior to version 3.6.0, the /api/query/sql lets a user run sql directly, but it only checks basic auth, not admin rights, any logged-in user, even readers, can run any sql query on the database. This issue has been patched in vers | ||
| CVE-2026-25992 | — | <= 0.0.0-20260126094835-d5d10dd41b0c | — | Feb 10, 2026 | SiYuan is a personal knowledge management system. Prior to 3.5.5, the /api/file/getFile endpoint uses case-sensitive string equality checks to block access to sensitive files. On case-insensitive file systems such as Windows, attackers can bypass restrictions using mixed-case pat | ||
| CVE-2026-25539 | — | <= 0.0.0-20260126094835-d5d10dd41b0c | — | Feb 4, 2026 | SiYuan is a personal knowledge management system. Prior to version 3.5.5, the /api/file/copyFile endpoint does not validate the dest parameter, allowing authenticated users to write files to arbitrary locations on the filesystem. This can lead to Remote Code Execution (RCE) by wr | ||
| CVE-2026-23850 | Hig | 7.5 | < 0.0.0-20260118092326-b2274baba2e1 | 0.0.0-20260118092326-b2274baba2e1 | Jan 19, 2026 | SiYuan is a personal knowledge management system. In versions prior to 3.5.4, the markdown feature allows unrestricted server side html-rendering which allows arbitrary file read (LFD). Version 3.5.4 fixes the issue. | |
| CVE-2026-23851 | — | < 0.0.0-20260118092521-f8f4b517077b | 0.0.0-20260118092521-f8f4b517077b | Jan 19, 2026 | SiYuan is a personal knowledge management system. Versions prior to 3.5.4 contain a logic vulnerability in the /api/file/globalCopyFiles endpoint. The function allows authenticated users to copy files from any location on the server's filesystem into the application's workspace w | ||
| CVE-2026-23847 | — | < 0.0.0-20260118021606-5c0cc375b475 | 0.0.0-20260118021606-5c0cc375b475 | Jan 19, 2026 | SiYuan is a personal knowledge management system. Versions prior to 3.5.4 are vulnerable to reflected cross-site scripting in /api/icon/getDynamicIcon due to unsanitized SVG input. The endpoint generates SVG images for text icons (type=8). The content query parameter is inserted | ||
| CVE-2026-23645 | — | < 0.0.0-20260116101155-11115da3d0de | 0.0.0-20260116101155-11115da3d0de | Jan 16, 2026 | SiYuan is self-hosted, open source personal knowledge management software. Prior to 3.5.4-dev2, a Stored Cross-Site Scripting (XSS) vulnerability exists in SiYuan Note. The application does not sanitize uploaded SVG files. If a user uploads and views a malicious SVG file (e.g., i | ||
| CVE-2025-67488 | — | <= 0.0.0-20251202123337-6ef83b42c7ce | — | Dec 9, 2025 | SiYuan is self-hosted, open source personal knowledge management software. Versions 0.0.0-20251202123337-6ef83b42c7ce and below contain function importZipMd which is vulnerable to ZipSlips, allowing an authenticated user to overwrite files on the system. An authenticated user wit | ||
| CVE-2025-21609 | — | >= 0 | — | Jan 3, 2025 | SiYuan is self-hosted, open source personal knowledge management software. SiYuan Note version 3.1.18 has an arbitrary file deletion vulnerability. The vulnerability exists in the `POST /api/history/getDocHistoryContent` endpoint. An attacker can craft a payload to exploit this v |
- CVE-2026-32815Mar 19, 2026affected <= 0.0.0-20260313024916-fd6526133bb3
SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the WebSocket endpoint (/ws) allows unauthenticated connections when specific URL parameters are provided (?app=siyuan&id=auth&type=auth). This bypass, intended for the login page to keep the kernel al
- CVE-2026-32751Mar 19, 2026affected <= 0.0.0-20260313024916-fd6526133bb3
SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the mobile file tree (MobileFiles.ts) renders notebook names via innerHTML without HTML escaping when processing renamenotebook WebSocket events. The desktop version (Files.ts) properly uses escapeHtml
- CVE-2026-32749Mar 19, 2026affected <= 0.0.0-20260313024916-fd6526133bb3
SiYuan is a personal knowledge management system. In versions 3.6.0 and below, POST /api/import/importSY and POST /api/import/importZipMd write uploaded archives to a path derived from the multipart filename field without sanitization, allowing an admin to write files to arbitrar
- CVE-2026-32747Mar 19, 2026affected <= 0.0.0-20260313024916-fd6526133bb3
SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the globalCopyFiles API eads source files using filepath.Abs() with no workspace boundary check, relying solely on util.IsSensitivePath() whose blocklist omits /proc/, /run/secrets/, and home director
- CVE-2026-32704Mar 13, 2026affected < 3.6.1fixed 3.6.1
SiYuan is a personal knowledge management system. Prior to 3.6.1, POST /api/template/renderSprig lacks model.CheckAdminRole, allowing any authenticated user to execute arbitrary SQL queries against the SiYuan workspace database and exfiltrate all note content, metadata, and custo
- CVE-2026-32110Mar 11, 2026affected < 3.6.0fixed 3.6.0
SiYuan is a personal knowledge management system. Prior to 3.6.0, the /api/network/forwardProxy endpoint allows authenticated users to make arbitrary HTTP requests from the server. The endpoint accepts a user-controlled URL and makes HTTP requests to it, returning the full respon
- CVE-2026-31809Mar 10, 2026affected < 0.0.0-20260310025236-297bd526708ffixed 0.0.0-20260310025236-297bd526708f
SiYuan is a personal knowledge management system. Prior to 3.5.10, SiYuan's SVG sanitizer (SanitizeSVG) checks href attributes for the javascript: prefix using strings.HasPrefix(). However, inserting ASCII tab ( ), newline ( ), or carriage return ( ) characters inside
- CVE-2026-31807Mar 10, 2026affected < 0.0.0-20260310025236-297bd526708ffixed 0.0.0-20260310025236-297bd526708f
SiYuan is a personal knowledge management system. Prior to 3.5.10, SiYuan's SVG sanitizer (SanitizeSVG) blocks dangerous elements (, , ) and removes on* event handlers and javascript: in href attributes. However, it does NOT block SVG animation elem
- CVE-2026-30869Mar 9, 2026affected < 3.5.10fixed 3.5.10
SiYuan is a personal knowledge management system. Prior to 3.5.10, a path traversal vulnerability in the /export endpoint allows an attacker to read arbitrary files from the server filesystem. By exploiting double‑encoded traversal sequences, an attacker can access sensitive file
- CVE-2026-30926Mar 9, 2026affected <= 0.0.0-20260304035530-d03ebdec8279
SiYuan is a personal knowledge management system. Prior to 3.5.10, a privilege escalation vulnerability exists in the publish service of SiYuan Note that allows low-privilege publish accounts (RoleReader) to modify notebook content via the /api/block/appendHeadingChildren API end
- CVE-2026-29183Mar 6, 2026affected < 0.0.0-20260304034809-d68bd5a79391fixed 0.0.0-20260304034809-d68bd5a79391
SiYuan is a personal knowledge management system. Prior to version 3.5.9, an unauthenticated reflected XSS vulnerability exists in the dynamic icon API endpoint "GET /api/icon/getDynamicIcon" when type=8, attacker-controlled content is embedded into SVG output without escaping. B
- CVE-2026-29073Mar 6, 2026affected <= 0.0.0-20260113130602-4ba64580c29c
SiYuan is a personal knowledge management system. Prior to version 3.6.0, the /api/query/sql lets a user run sql directly, but it only checks basic auth, not admin rights, any logged-in user, even readers, can run any sql query on the database. This issue has been patched in vers
- CVE-2026-25992Feb 10, 2026affected <= 0.0.0-20260126094835-d5d10dd41b0c
SiYuan is a personal knowledge management system. Prior to 3.5.5, the /api/file/getFile endpoint uses case-sensitive string equality checks to block access to sensitive files. On case-insensitive file systems such as Windows, attackers can bypass restrictions using mixed-case pat
- CVE-2026-25539Feb 4, 2026affected <= 0.0.0-20260126094835-d5d10dd41b0c
SiYuan is a personal knowledge management system. Prior to version 3.5.5, the /api/file/copyFile endpoint does not validate the dest parameter, allowing authenticated users to write files to arbitrary locations on the filesystem. This can lead to Remote Code Execution (RCE) by wr
- affected < 0.0.0-20260118092326-b2274baba2e1fixed 0.0.0-20260118092326-b2274baba2e1
SiYuan is a personal knowledge management system. In versions prior to 3.5.4, the markdown feature allows unrestricted server side html-rendering which allows arbitrary file read (LFD). Version 3.5.4 fixes the issue.
- CVE-2026-23851Jan 19, 2026affected < 0.0.0-20260118092521-f8f4b517077bfixed 0.0.0-20260118092521-f8f4b517077b
SiYuan is a personal knowledge management system. Versions prior to 3.5.4 contain a logic vulnerability in the /api/file/globalCopyFiles endpoint. The function allows authenticated users to copy files from any location on the server's filesystem into the application's workspace w
- CVE-2026-23847Jan 19, 2026affected < 0.0.0-20260118021606-5c0cc375b475fixed 0.0.0-20260118021606-5c0cc375b475
SiYuan is a personal knowledge management system. Versions prior to 3.5.4 are vulnerable to reflected cross-site scripting in /api/icon/getDynamicIcon due to unsanitized SVG input. The endpoint generates SVG images for text icons (type=8). The content query parameter is inserted
- CVE-2026-23645Jan 16, 2026affected < 0.0.0-20260116101155-11115da3d0defixed 0.0.0-20260116101155-11115da3d0de
SiYuan is self-hosted, open source personal knowledge management software. Prior to 3.5.4-dev2, a Stored Cross-Site Scripting (XSS) vulnerability exists in SiYuan Note. The application does not sanitize uploaded SVG files. If a user uploads and views a malicious SVG file (e.g., i
- CVE-2025-67488Dec 9, 2025affected <= 0.0.0-20251202123337-6ef83b42c7ce
SiYuan is self-hosted, open source personal knowledge management software. Versions 0.0.0-20251202123337-6ef83b42c7ce and below contain function importZipMd which is vulnerable to ZipSlips, allowing an authenticated user to overwrite files on the system. An authenticated user wit
- CVE-2025-21609Jan 3, 2025affected >= 0
SiYuan is self-hosted, open source personal knowledge management software. SiYuan Note version 3.1.18 has an arbitrary file deletion vulnerability. The vulnerability exists in the `POST /api/history/getDocHistoryContent` endpoint. An attacker can craft a payload to exploit this v
Page 2 of 3