SiYuan is a personal knowledge management system. Prior to version 3.5.5, the /api/file/copyFile endpoint does not validate the dest parameter, allowing authenticated users to write files to arbitrary locations on the filesystem. This can lead to Remote Code Execution (RCE) by writing to sensitive locations such as cron jobs, SSH authorized_keys, or shell configuration files. This issue has been patched in version 3.5.5.
References
| Link | Resource |
|---|---|
| https://github.com/siyuan-note/siyuan/commit/d7f790755edf8c78d2b4176171e5a0cdcd720feb | Patch |
| https://github.com/siyuan-note/siyuan/security/advisories/GHSA-c4jr-5q7w-f6r9 | Exploit Vendor Advisory |
| https://github.com/siyuan-note/siyuan/security/advisories/GHSA-c4jr-5q7w-f6r9 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-04 22:16
Updated : 2026-02-11 19:10
NVD link : CVE-2026-25539
Mitre link : CVE-2026-25539
CVE.ORG link : CVE-2026-25539
JSON object : View
Products Affected
b3log
- siyuan
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
