Impact
The vulnerability is a stored cross‑site scripting flaw in Siyuan’s Attribute View rendering. An attacker can place a crafted HTTP or HTTPS URL lacking an extension in an Attribute View’s ‘mAsse’ field. When a user opens a Gallery or Kanban view that uses ‘Cover From → Asset Field’, the application stores this URL in the coverURL field and injects it directly into an <img src="..."> element without escaping. Because the Electron desktop client runs with nodeIntegration enabled and contextIsolation disabled, the injected script runs with Node.js privileges, allowing the attacker to execute arbitrary operating‑system commands under the victim’s user account. The flaw arises from CWE‑79 (Stored Cross‑Site Scripting) and CWE‑94 (Code Injection).
Affected Systems
Affecting all versions of the Siyuan personal knowledge‑management system released prior to 3.6.2, the issue is present for users who run the Electron desktop client. The vulnerability specifically targets the gallery and kanban view rendering when the cover is sourced from an asset field. Users of personnel or organizations relying on Siyuan for note‑keeping or task management are susceptible unless they are on the patched release.
Risk and Exploitability
With a CVSS v3.1 score of 9.1, the vulnerability carries a high severity rating, indicating a full compromise of the victim’s operating system. EPSS shows a low exploitation likelihood (<1 %), suggesting that the attack is more likely to be targeted rather than widespread. The problem is not yet listed in the CISA KEV catalog, but its impact is severe for any user who can manipulate attribute fields. Attackers would need to inject malicious URLs into the data and convince a victim to open a gallery or kanban view with the problematic cover option; no network‑side control is required beyond the initial data compromise. Once exploited, the attacker gains complete control of the host machine.
OpenCVE Enrichment
Github GHSA