SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the /api/lute/html2BlockDOM on the desktop copies local files pointed to by file:// links in pasted HTML into the workspace assets directory without validating paths against a sensitive-path list. Together with GET /assets/*path, which only requires authentication, a publish-service visitor can cause the desktop kernel to copy any readable sensitive file and then read it via GET, leading to exfiltration of sensitive files. This issue has been fixed in version 3.6.1.
References
| Link | Resource |
|---|---|
| https://github.com/siyuan-note/siyuan/commit/294b8b429dea152cd1df522cddf406054c1619ad | Patch |
| https://github.com/siyuan-note/siyuan/releases/tag/v3.6.1 | Release Notes |
| https://github.com/siyuan-note/siyuan/security/advisories/GHSA-fq2j-j8hc-8vw8 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-20 04:16
Updated : 2026-03-23 18:21
NVD link : CVE-2026-32938
Mitre link : CVE-2026-32938
CVE.ORG link : CVE-2026-32938
JSON object : View
Products Affected
b3log
- siyuan
