Description
SiYuan is a personal knowledge management system. Prior to 3.6.1, POST /api/template/renderSprig lacks model.CheckAdminRole, allowing any authenticated user to execute arbitrary SQL queries against the SiYuan workspace database and exfiltrate all note content, metadata, and custom attributes. This vulnerability is fixed in 3.6.1.
Published: 2026-03-13
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality & Integrity Breach
Action: Patch
AI Analysis

Impact

The vulnerability exists due to a missing admin check in the POST /api/template/renderSprig endpoint. Key detail from vendor description: "Prior to 3.6.1, POST /api/template/renderSprig lacks model.CheckAdminRole, allowing any authenticated user to execute arbitrary SQL queries against the SiYuan workspace database and exfiltrate all note content, metadata, and custom attributes." These permissions enable an attacker with any authenticated account to read or potentially modify all data, resulting in a confidentiality and integrity breach. The weakness is identified as authentication bypass (CWE‑285) and improper privilege management (CWE‑732).

Affected Systems

All SiYuan products from the vendor siyuan-note:siyuan running versions earlier than 3.6.1 are affected. The issue is fixed in version 3.6.1. No additional sub‑version details are provided in the data.

Risk and Exploitability

The CVSS score is 6.5, indicating moderate severity. The EPSS score is less than 1%, suggesting low likelihood of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is an authenticated remote request to the vulnerable endpoint. Because any authenticated user can exploit the flaw, the potential impact scope spans the entire workspace of the compromised user. The referenced advisory (https://github.com/siyuan-note/siyuan/security/advisories/GHSA-4j3x-hhg2-fm2x) confirms the public disclosure of this vulnerability.

Generated by OpenCVE AI on March 17, 2026 at 20:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch to upgrade SiYuan to version 3.6.1 or later
  • If an upgrade is not immediately possible, consult the vendor for an alternate fix or consider restricting access to the /api/template/renderSprig endpoint to admin users

Generated by OpenCVE AI on March 17, 2026 at 20:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4j3x-hhg2-fm2x SiYuan's renderSprig has a missing admin check that allows any user to read full workspace DB
History

Tue, 17 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared B3log
B3log siyuan
CPEs cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*
Vendors & Products B3log
B3log siyuan

Mon, 16 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Siyuan
Siyuan siyuan
Vendors & Products Siyuan
Siyuan siyuan

Fri, 13 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
Description SiYuan is a personal knowledge management system. Prior to 3.6.1, POST /api/template/renderSprig lacks model.CheckAdminRole, allowing any authenticated user to execute arbitrary SQL queries against the SiYuan workspace database and exfiltrate all note content, metadata, and custom attributes. This vulnerability is fixed in 3.6.1.
Title SiYuan renderSprig: missing admin check allows any user to read full workspace DB
Weaknesses CWE-285
CWE-732
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-16T16:46:59.090Z

Reserved: 2026-03-13T14:33:42.823Z

Link: CVE-2026-32704

cve-icon Vulnrichment

Updated: 2026-03-16T16:46:51.454Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:41.233

Modified: 2026-03-17T19:02:25.640

Link: CVE-2026-32704

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:39:25Z

Weaknesses