Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases. Prior to 0.101.0, a critical timing attack vulnerability in Trilium's sync authentication endpoint allows unauthenticated remote attackers to recover HMAC authentication hashes byte-by-byte through statistical timing analysis. This enables complete authentication bypass without password knowledge, granting full read/write access to victim's knowledge base. This vulnerability is fixed in 0.101.0.
References
| Link | Resource |
|---|---|
| https://github.com/TriliumNext/Trilium/pull/8129 | Issue Tracking Patch |
| https://github.com/TriliumNext/Trilium/security/advisories/GHSA-hxf6-58cx-qq3x | Exploit Mitigation Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-06 22:16
Updated : 2026-02-24 15:14
NVD link : CVE-2025-68621
Mitre link : CVE-2025-68621
CVE.ORG link : CVE-2025-68621
JSON object : View
Products Affected
triliumnotes
- trilium
CWE
CWE-208
Observable Timing Discrepancy
