SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Siyuan kernel exposes an unauthenticated file-serving endpoint under `/appearance/*filepath.` Due to improper path sanitization, attackers can perform directory traversal and read arbitrary files accessible to the server process. Authentication checks explicitly exclude this endpoint, allowing exploitation without valid credentials. Version 3.6.2 fixes this issue.
References
| Link | Resource |
|---|---|
| https://github.com/siyuan-note/siyuan/commit/009bb598b3beccc972aa5f1ed88b3b224326bf2a | Patch |
| https://github.com/siyuan-note/siyuan/security/advisories/GHSA-hhgj-gg9h-rjp7 | Exploit Vendor Advisory |
| https://github.com/siyuan-note/siyuan/security/advisories/GHSA-hhgj-gg9h-rjp7 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-20 23:16
Updated : 2026-03-23 22:16
NVD link : CVE-2026-33476
Mitre link : CVE-2026-33476
CVE.ORG link : CVE-2026-33476
JSON object : View
Products Affected
b3log
- siyuan
