Description
SiYuan is a personal knowledge management system. Prior to version 3.6.2, an attacker who can place a malicious URL in an Attribute View mAsse field can trigger stored XSS when a victim opens the Gallery or Kanban view with “Cover From -> Asset Field” enabled. The vulnerable code accepts arbitrary http(s) URLs without extensions as images, stores the attacker-controlled string in coverURL, and injects it directly into an <img src="..."> attribute without escaping. In the Electron desktop client, the injected JavaScript executes with nodeIntegration enabled and contextIsolation disabled, so the XSS reaches arbitrary OS command execution under the victim’s account. This issue has been patched in version 3.6.2.
Published: 2026-03-31
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary OS Command Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stored cross‑site scripting flaw in Siyuan’s Attribute View rendering. An attacker can place a crafted HTTP or HTTPS URL lacking an extension in an Attribute View’s ‘mAsse’ field. When a user opens a Gallery or Kanban view that uses ‘Cover From → Asset Field’, the application stores this URL in the coverURL field and injects it directly into an <img src="..."> element without escaping. Because the Electron desktop client runs with nodeIntegration enabled and contextIsolation disabled, the injected script runs with Node.js privileges, allowing the attacker to execute arbitrary operating‑system commands under the victim’s user account. The flaw arises from CWE‑79 (Stored Cross‑Site Scripting) and CWE‑94 (Code Injection).

Affected Systems

Affecting all versions of the Siyuan personal knowledge‑management system released prior to 3.6.2, the issue is present for users who run the Electron desktop client. The vulnerability specifically targets the gallery and kanban view rendering when the cover is sourced from an asset field. Users of personnel or organizations relying on Siyuan for note‑keeping or task management are susceptible unless they are on the patched release.

Risk and Exploitability

With a CVSS v3.1 score of 9.1, the vulnerability carries a high severity rating, indicating a full compromise of the victim’s operating system. EPSS shows a low exploitation likelihood (<1 %), suggesting that the attack is more likely to be targeted rather than widespread. The problem is not yet listed in the CISA KEV catalog, but its impact is severe for any user who can manipulate attribute fields. Attackers would need to inject malicious URLs into the data and convince a victim to open a gallery or kanban view with the problematic cover option; no network‑side control is required beyond the initial data compromise. Once exploited, the attacker gains complete control of the host machine.

Generated by OpenCVE AI on April 3, 2026 at 20:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Siyuan to version 3.6.2 or later to apply the vendor patch.
  • If an upgrade cannot be performed immediately, disable the Gallery or Kanban cover feature or restrict the use of external URLs in the Asset Field to prevent the injected script from executing.
  • Monitor user accounts for unexpected command execution or abnormal activity, and review logs for signs of remote code execution.

Generated by OpenCVE AI on April 3, 2026 at 20:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rx4h-526q-4458 SiYuan: Stored XSS in Attribute View Gallery/Kanban Cover Rendering Allows Arbitrary Command Execution in Desktop Client
History

Fri, 03 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared B3log
B3log siyuan
CPEs cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*
Vendors & Products B3log
B3log siyuan

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Siyuan
Siyuan siyuan
Vendors & Products Siyuan
Siyuan siyuan

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description SiYuan is a personal knowledge management system. Prior to version 3.6.2, an attacker who can place a malicious URL in an Attribute View mAsse field can trigger stored XSS when a victim opens the Gallery or Kanban view with “Cover From -> Asset Field” enabled. The vulnerable code accepts arbitrary http(s) URLs without extensions as images, stores the attacker-controlled string in coverURL, and injects it directly into an <img src="..."> attribute without escaping. In the Electron desktop client, the injected JavaScript executes with nodeIntegration enabled and contextIsolation disabled, so the XSS reaches arbitrary OS command execution under the victim’s account. This issue has been patched in version 3.6.2.
Title SiYuan: Stored XSS in Attribute View gallery/kanban cover rendering allows arbitrary command execution in the desktop client
Weaknesses CWE-79
CWE-94
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T16:05:31.678Z

Reserved: 2026-03-27T18:18:14.895Z

Link: CVE-2026-34448

cve-icon Vulnrichment

Updated: 2026-04-03T16:05:19.187Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T22:16:19.657

Modified: 2026-04-03T16:58:40.760

Link: CVE-2026-34448

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:17:26Z

Weaknesses