CVE-2026-33067

SiYuan is a personal knowledge management system. Versions 3.6.0 and below render package metadata fields (displayName, description) using template literals without HTML escaping. A malicious package author can inject arbitrary HTML/JavaScript into these fields, which executes automatically when any user browses the Bazaar page. Because SiYuan's Electron configuration enables nodeIntegration: true with contextIsolation: false, this XSS escalates directly to full Remote Code Execution on the victim's operating system — with zero user interaction beyond opening the marketplace tab. This issue has been fixed in version 3.6.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-20 09:16

Updated : 2026-03-23 15:31


NVD link : CVE-2026-33067

Mitre link : CVE-2026-33067

CVE.ORG link : CVE-2026-33067


JSON object : View

Products Affected

b3log

  • siyuan
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')