Description
SiYuan is a personal knowledge management system. Prior to version 3.6.2, the `IsSensitivePath()` function in `kernel/util/path.go` uses a denylist approach that was recently expanded (GHSA-h5vh-m7fg-w5h6, commit 9914fd1) but remains incomplete. Multiple security-relevant Linux directories are not blocked, including `/opt` (application data), `/usr` (local configs/binaries), `/home` (other users), `/mnt` and `/media` (mounted volumes). The `globalCopyFiles` and `importStdMd` endpoints rely on `IsSensitivePath` as their primary defense against reading files outside the workspace. Version 3.6.2 contains an updated fix.
Published: 2026-03-20
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Potential confidentiality breach through unauthorized file reading
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in Siyuan’s IsSensitivePath function, which uses a denylist to prevent file access outside the workspace. An incomplete denylist allows external calls to the globalCopyFiles and importStdMd endpoints to read arbitrary files from critical Linux directories such as /opt, /usr, /home, /mnt, and /media. This can expose sensitive configuration files, binaries, or personal data, leading to a compromise of confidentiality. The weakness is a classic path traversal issue (CWE‑22).

Affected Systems

Siyuan, a personal knowledge management system provided by siyuan-note, is affected whenever it runs a version older than 3.6.2. Versions prior to 3.6.2 lack the complete denylist and therefore allow the exploit. The advisory specifically lists version 3.6.2 as containing the correct fix.

Risk and Exploitability

The CVSS score of 6.8 classifies this as a medium severity issue, while the EPSS score of less than 1% indicates a currently low probability of exploitation. The vulnerability has not been added to the CISA KEV catalog, implying no known widespread exploitation. Attackers can leverage the exposed REST endpoints – a likely remote attack vector – to read sensitive files. Successful exploitation would only require network access to the endpoints or local execution of the affected code base.

Generated by OpenCVE AI on March 23, 2026 at 20:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to version 3.6.2 or later to receive the complete denylist fix.
  • If an upgrade is not immediately possible, limit or disable access to the globalCopyFiles and importStdMd endpoints to trusted users only.
  • Verify that no private files reside in the disallowed directories if an older version must remain in use.

Generated by OpenCVE AI on March 23, 2026 at 20:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-vm69-h85x-8p85 SiYuan has an Incomplete Fix for IsSensitivePath Denylist Allows File Read from /opt, /usr, /home (GHSA-h5vh-m7fg-w5h6 Bypass)
History

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared B3log
B3log siyuan
CPEs cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*
Vendors & Products B3log
B3log siyuan

Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Siyuan
Siyuan siyuan
Vendors & Products Siyuan
Siyuan siyuan

Fri, 20 Mar 2026 22:45:00 +0000

Type Values Removed Values Added
Description SiYuan is a personal knowledge management system. Prior to version 3.6.2, the `IsSensitivePath()` function in `kernel/util/path.go` uses a denylist approach that was recently expanded (GHSA-h5vh-m7fg-w5h6, commit 9914fd1) but remains incomplete. Multiple security-relevant Linux directories are not blocked, including `/opt` (application data), `/usr` (local configs/binaries), `/home` (other users), `/mnt` and `/media` (mounted volumes). The `globalCopyFiles` and `importStdMd` endpoints rely on `IsSensitivePath` as their primary defense against reading files outside the workspace. Version 3.6.2 contains an updated fix.
Title SiYuan has an Incomplete Fix for IsSensitivePath Denylist Allows File Read from /opt, /usr, /home
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-25T13:45:09.722Z

Reserved: 2026-03-17T22:16:36.721Z

Link: CVE-2026-33194

cve-icon Vulnrichment

Updated: 2026-03-25T13:45:06.514Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T23:16:45.357

Modified: 2026-03-23T18:53:21.510

Link: CVE-2026-33194

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:34:20Z

Weaknesses