Description
SiYuan is a personal knowledge management system. Prior to 3.5.10, a path traversal vulnerability in the /export endpoint allows an attacker to read arbitrary files from the server filesystem. By exploiting double‑encoded traversal sequences, an attacker can access sensitive files such as conf/conf.json, which contains secrets including the API token, cookie signing key, and workspace access authentication code. Leaking these secrets may enable administrative access to the SiYuan kernel API, and in certain deployment scenarios could potentially be chained into remote code execution (RCE). This vulnerability is fixed in 3.5.10.
Published: 2026-03-09
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Read
Action: Patch
AI Analysis

Impact

The vulnerability arises from a path traversal flaw (CWE‑22) that is bypassed when double‑encoded traversal sequences are used against the /export endpoint of the SiYuan knowledge‑management system. This flaw allows an attacker to craft an HTTP request that retrieves arbitrary file paths and obtains the contents of any file that the server process can read. Exposure of locally stored configuration files, such as conf/conf.json, can leak API tokens, cookie signing keys and workspace authentication secrets. These credentials could grant the attacker administrative access to the SiYuan kernel API and, in certain deployment scenarios, the attacker could subsequently achieve remote code execution.

Affected Systems

Siyuan, the personal knowledge‑management application distributed by siyuan-note, is vulnerable in all releases before version 3.5.10. The CPE library lists the product as b3log:siyuan and the CNA indicates affected vendors/products as siyuan-note:siyuan. No specific sub‑version constraints are given beyond the statement that the fix is in 3.5.10.

Risk and Exploitability

The CVSS score is 9.3, marking the flaw as critical. The EPSS rating of less than 1 % suggests an extremely low probability of widespread exploitation as recorded in current data, and the vulnerability has not been listed in the CISA KEV catalog. Based on the description, the likely attack vector is remote over the network. The necessary conditions are that the attacker can reach the victim’s SiYuan instance and that it runs a version older than 3.5.10. Once executed, the attacker can read sensitive files and may leverage the extracted secrets to gain administrative privileges, potentially chaining into remote code execution depending on the deployment configuration.

Generated by OpenCVE AI on April 17, 2026 at 11:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SiYuan to version 3.5.10 or newer to apply the vendor‑supplied fix.
  • If an upgrade cannot be performed immediately, restrict network exposure of the SiYuan instance so that the /export endpoint is reachable only from trusted hosts or internal IP ranges.
  • Move or protect sensitive files such as conf/conf.json from the directories that can be served via path traversal, ensuring that even if traversal succeeds the attacker cannot read them.
  • Monitor evaluation logs for unusual /export activity and apply additional intrusion detection if available.

Generated by OpenCVE AI on April 17, 2026 at 11:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2h2p-mvfx-868w SiYuan Vulnerable to Path Traversal in /export Endpoint Allows Arbitrary File Read and Secret Leakage
History

Fri, 13 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared B3log
B3log siyuan
CPEs cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*
Vendors & Products B3log
B3log siyuan

Wed, 11 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Siyuan
Siyuan siyuan
Vendors & Products Siyuan
Siyuan siyuan

Mon, 09 Mar 2026 22:45:00 +0000

Type Values Removed Values Added
Description SiYuan is a personal knowledge management system. Prior to 3.5.10, a path traversal vulnerability in the /export endpoint allows an attacker to read arbitrary files from the server filesystem. By exploiting double‑encoded traversal sequences, an attacker can access sensitive files such as conf/conf.json, which contains secrets including the API token, cookie signing key, and workspace access authentication code. Leaking these secrets may enable administrative access to the SiYuan kernel API, and in certain deployment scenarios could potentially be chained into remote code execution (RCE). This vulnerability is fixed in 3.5.10.
Title SiYuan has a Path Traversal in /export Endpoint Allows Arbitrary File Read and Secret Leakage
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-10T14:18:46.445Z

Reserved: 2026-03-06T00:04:56.697Z

Link: CVE-2026-30869

cve-icon Vulnrichment

Updated: 2026-03-10T14:18:38.916Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T17:40:14.380

Modified: 2026-03-13T15:33:01.727

Link: CVE-2026-30869

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:00:11Z

Weaknesses