Impact
SiYuan Personal Knowledge Management System allowed any authenticated user to submit a local file path that was imported without validation. The import process recursively read every file under the given path and stored the content as persistent note documents in the workspace database, making them searchable and available to all workspace users. When combined with a separate SQL injection vulnerability, a non‑admin user could read the imported secrets without additional privileges. This leads to unauthorized information disclosure and potential privilege escalation. The vulnerability was mitigated in version 3.6.1.
Affected Systems
The affected product is SiYuan, a personal knowledge management tool from the vendor siyuan-note. Versions 3.6.0 and earlier are vulnerable; the issue was fixed in version 3.6.1. All installations using the affected releases should be considered compromised until updated.
Risk and Exploitability
The CVSS score of 6.8 indicates a medium severity, and the EPSS score of less than 1% suggests low current exploit activity. The vulnerability is not listed in CISA’s KEV catalog. Attackers can trigger the flaw by sending a POST request to the /api/import/importStdMd endpoint with an arbitrary local path; no additional privileges are required beyond normal authenticated API access. The risk is amplified when combined with the separate renderSprig SQL injection advisory. If only the import functionality is exploited without the injection, the threat reduces to information disclosure; with the injection, it extends to full data exfiltration and potential privilege escalation.
OpenCVE Enrichment
Github GHSA