Description
SiYuan is a personal knowledge management system. In versions prior to 3.5.4, the markdown feature allows unrestricted server side html-rendering which allows arbitrary file read (LFD). Version 3.5.4 fixes the issue.
Published: 2026-01-19
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality Breach via Arbitrary File Read
Action: Patch Immediately
AI Analysis

Impact

The vulnerability resides in SiYuan’s markdown processing, where unrestricted server‑side HTML rendering permits reading any file accessible to the application. An attacker who can supply malicious markdown can retrieve arbitrary server files, exposing sensitive data and potentially system configuration. This is classified as a file‑reading flaw (CWE‑22).

Affected Systems

Versions of SiYuan prior to 3.5.4 are affected. The product is the SiYuan personal knowledge management system distributed by Siyuan-Note. The issue was corrected in release 3.5.4, eliminating the insecure rendering path.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity. The EPSS score is below 1 %, signalling a low current likelihood of exploitation, and the vulnerability is not yet listed in CISA’s KEV catalog. Likely, an attacker would exploit the flaw remotely by sending crafted markdown content to the server’s rendering endpoint, triggering the uncontrolled file read. The absence from KEV implies no widespread public exploitation has been reported at present.

Generated by OpenCVE AI on April 18, 2026 at 05:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SiYuan to version 3.5.4 or later to eliminate the insecure markdown rendering path.
  • If upgrading is not immediately feasible, restrict or disable the server‑side HTML rendering feature for markdown to prevent arbitrary file access.
  • Enforce strict input validation on markdown uploads, ensuring file paths are resolved relative to a safely defined directory and that no absolute or parent‑directory paths are accepted.

Generated by OpenCVE AI on April 18, 2026 at 05:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-cv54-7wv7-qxcw SiYuan vulnerable to Arbitrary file Read / SSRF
History

Fri, 30 Jan 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared B3log
B3log siyuan
CPEs cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*
Vendors & Products B3log
B3log siyuan
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Tue, 20 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Siyuan
Siyuan siyuan
Vendors & Products Siyuan
Siyuan siyuan

Mon, 19 Jan 2026 20:00:00 +0000

Type Values Removed Values Added
Description SiYuan is a personal knowledge management system. In versions prior to 3.5.4, the markdown feature allows unrestricted server side html-rendering which allows arbitrary file read (LFD). Version 3.5.4 fixes the issue.
Title SiYuan vulnerable to arbitrary file read
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 7.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-20T20:05:16.346Z

Reserved: 2026-01-16T15:46:40.843Z

Link: CVE-2026-23850

cve-icon Vulnrichment

Updated: 2026-01-20T20:04:02.837Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T20:15:49.533

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-23850

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:15:15Z

Weaknesses