SiYuan is a personal knowledge management system. In versions 3.6.0 and below, POST /api/import/importStdMd passes the localPath parameter directly to model.ImportFromLocalPath with zero path validation. The function recursively reads every file under the given path and permanently stores their content as SiYuan note documents in the workspace database, making them searchable and accessible to all workspace users. Data persists in the workspace database across restarts and is accessible to Publish Service Reader accounts. Combined with the renderSprig SQL injection ( separate advisory ), a non-admin user can then read all imported secrets without any additional privileges. This issue has been fixed in version 3.6.1.
References
| Link | Resource |
|---|---|
| https://github.com/siyuan-note/siyuan/commit/13b6d3d45e83525654d120f32a3fdc5d9e95df0b | Patch |
| https://github.com/siyuan-note/siyuan/releases/tag/v3.6.1 | Release Notes |
| https://github.com/siyuan-note/siyuan/security/advisories/GHSA-rjhh-m223-9qqv | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-19 22:16
Updated : 2026-03-23 18:09
NVD link : CVE-2026-32750
Mitre link : CVE-2026-32750
CVE.ORG link : CVE-2026-32750
JSON object : View
Products Affected
b3log
- siyuan
