Description
SiYuan is a personal knowledge management system. Versions 3.6.0 and below render package metadata fields (displayName, description) using template literals without HTML escaping. A malicious package author can inject arbitrary HTML/JavaScript into these fields, which executes automatically when any user browses the Bazaar page. Because SiYuan's Electron configuration enables nodeIntegration: true with contextIsolation: false, this XSS escalates directly to full Remote Code Execution on the victim's operating system — with zero user interaction beyond opening the marketplace tab. This issue has been fixed in version 3.6.1.
Published: 2026-03-20
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

SiYuan’s Bazaar package metadata appears in the application without HTML escaping. A malicious author can insert arbitrary HTML or JavaScript into the display name or description fields, which is rendered when any user visits the Bazaar page. Because the Electron configuration enables node integration and disables context isolation, the injected script runs with full Node.js privileges. This elevates the ordinary client‑side XSS to a full remote code execution that operates on the victim’s operating system without any further user interaction beyond opening the marketplace tab.

Affected Systems

The affected product is SiYuan, the personal knowledge‑management system from the vendor siyuan-note. Versions 3.6.0 and all prior releases are vulnerable; the issue was resolved in version 3.6.1, which sanitizes package metadata before rendering.

Risk and Exploitability

The base CVSS score of 5.3 and an EPSS less than 1% indicate a moderate severity with a currently low exploitation probability. The vulnerability is not listed in the CISA KEV catalog, and no widespread active exploitation has been reported. An attacker would need to host or persuade a victim to install a malicious Bazaar package, but once the package is viewed the attacker can execute arbitrary system commands, representing a significant threat to any device running the affected SiYuan installation.

Generated by OpenCVE AI on March 23, 2026 at 16:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SiYuan to version 3.6.1 or later, which sanitizes Bazai package metadata fields.

Generated by OpenCVE AI on March 23, 2026 at 16:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mvpm-v6q4-m2pf SiYuan has Stored XSS to RCE via Unsanitized Bazaar Package Metadata
History

Mon, 23 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared B3log
B3log siyuan
CPEs cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*
Vendors & Products B3log
B3log siyuan
Metrics cvssV3_1

{'score': 9.0, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}


Fri, 20 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Siyuan
Siyuan siyuan
Vendors & Products Siyuan
Siyuan siyuan

Fri, 20 Mar 2026 08:30:00 +0000

Type Values Removed Values Added
Description SiYuan is a personal knowledge management system. Versions 3.6.0 and below render package metadata fields (displayName, description) using template literals without HTML escaping. A malicious package author can inject arbitrary HTML/JavaScript into these fields, which executes automatically when any user browses the Bazaar page. Because SiYuan's Electron configuration enables nodeIntegration: true with contextIsolation: false, this XSS escalates directly to full Remote Code Execution on the victim's operating system — with zero user interaction beyond opening the marketplace tab. This issue has been fixed in version 3.6.1.
Title SiYuan has Stored XSS to RCE via Unsanitized Bazaar Package Metadata
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T18:07:28.928Z

Reserved: 2026-03-17T19:27:06.343Z

Link: CVE-2026-33067

cve-icon Vulnrichment

Updated: 2026-03-20T16:07:56.034Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T09:16:14.863

Modified: 2026-03-23T15:31:25.547

Link: CVE-2026-33067

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:29:54Z

Weaknesses