Impact
A stored cross‑site scripting flaw in the SiYuan mobile file tree allows an authenticated user to rename a notebook with malicious HTML or JavaScript. The application renders this name using innerHTML without escaping, causing the injected code to run on any mobile client that displays the file tree. Because the Electron environment is configured with nodeIntegration enabled and contextIsolation disabled, the script gains full Node.js access, transforming the stored XSS into full remote code execution that can compromise the entire system.
Affected Systems
The vulnerability affects the SiYuan personal knowledge management system released by siyuan‑note:siyuan. All versions up to and including 3.6.0 are susceptible; the issue was fixed in release 3.6.1. The same mobile interface code is also used by the Electron desktop app when the window is narrow, so desktop users in that view are also affected.
Risk and Exploitability
The CVSS score of 5.1 indicates moderate severity, and the EPSS score is less than 1 %, suggesting a low overall exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to be authenticated and able to rename notebooks, and the target client must render the vulnerable file tree. When these conditions are met, the attacker can execute arbitrary code with Node.js privileges, posing a significant risk to all accounts with rename rights.
OpenCVE Enrichment
Github GHSA