CVE-2026-30926

SiYuan is a personal knowledge management system. Prior to 3.5.10, a privilege escalation vulnerability exists in the publish service of SiYuan Note that allows low-privilege publish accounts (RoleReader) to modify notebook content via the /api/block/appendHeadingChildren API endpoint. The endpoint requires only the model.CheckAuth role, which accepts RoleReader sessions, but it does not enforce stricter checks, such as CheckAdminRole or CheckReadonly. This allows remote authenticated publish users with read-only privileges to append new blocks to existing documents, compromising the integrity of stored notes.
Configurations

Configuration 1 (hide)

cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-10 07:44

Updated : 2026-03-13 17:06


NVD link : CVE-2026-30926

Mitre link : CVE-2026-30926

CVE.ORG link : CVE-2026-30926


JSON object : View

Products Affected

b3log

  • siyuan
CWE
CWE-284

Improper Access Control

CWE-862

Missing Authorization