Description
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and prior, the /api/av/removeUnusedAttributeView endpoint constructs a filesystem path using the user-controlled id parameter without validation or path boundary enforcement. An attacker can inject path traversal sequences such as ../ into the id value to escape the intended directory and delete arbitrary .json files on the server, including global configuration files and workspace metadata. This issue has been fixed in version 3.6.4.
Published: 2026-04-16
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Deletion
Action: Patch
AI Analysis

Impact

The vulnerability exists in the /api/av/removeUnusedAttributeView endpoint of the SiYuan application. The endpoint concatenates a user‑controlled id parameter directly into a file path, without any bounds checking or validation, allowing a malformed id that contains path traversal characters to escape the intended directory. An attacker who can supply such an id can delete arbitrary JSON files on the server, including global configuration files and workspace metadata. The resulting data loss or misconfiguration can lead to application disruption or inconsistent user state, and in worst‑case scenarios may allow an attacker to erase critical notes or workspace metadata.

Affected Systems

Siyuan Note – SiYuan personal knowledge management system. Affected releases are 3.6.3 and earlier. The issue has been fixed starting with version 3.6.4.

Risk and Exploitability

The CVSS score of 8.5 classifies the flaw as High severity. No EPSS score is publicly available, and the vulnerability is not yet listed in the CISA KEV catalog. The attack requires that the attacker be able to send requests to the mentioned API endpoint, which typically means having a valid authentication token or remaining sessions. When the attack is successful, the victim’s server is able to delete critical configuration files, potentially causing downtime or loss of user data. The flaw is remotely exploitable by sending crafted HTTP requests, meaning it can be triggered without gaining local access to the host.

Generated by OpenCVE AI on April 17, 2026 at 02:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SiYuan to version 3.6.4 or later, where the path handling is corrected.
  • Disallow or disable the /api/av/removeUnusedAttributeView endpoint until an upgrade is performed, to prevent unauthorized or unauthenticated requests.
  • Implement input validation or directory boundary checks on the id parameter to ensure path traversal sequences cannot be used to reference files outside the intended directory.

Generated by OpenCVE AI on April 17, 2026 at 02:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-vw86-c94w-v3x4 SiYuan: Publish Reader Path Traversal Delete via `removeUnusedAttributeView`
History

Sat, 18 Apr 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Siyuan
Siyuan siyuan
Vendors & Products Siyuan
Siyuan siyuan

Thu, 16 Apr 2026 23:15:00 +0000

Type Values Removed Values Added
Description SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and prior, the /api/av/removeUnusedAttributeView endpoint constructs a filesystem path using the user-controlled id parameter without validation or path boundary enforcement. An attacker can inject path traversal sequences such as ../ into the id value to escape the intended directory and delete arbitrary .json files on the server, including global configuration files and workspace metadata. This issue has been fixed in version 3.6.4.
Title SiYuan: Publish Reader Path Traversal Delete via `removeUnusedAttributeView`
Weaknesses CWE-24
References
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-18T02:48:57.193Z

Reserved: 2026-04-10T21:41:54.505Z

Link: CVE-2026-40318

cve-icon Vulnrichment

Updated: 2026-04-18T02:48:53.091Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-16T23:16:33.590

Modified: 2026-04-17T15:38:09.243

Link: CVE-2026-40318

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T08:00:10Z

Weaknesses