Impact
A crafted document title containing a URL-encoded <img> element bypasses the app’s escape routine, is decoded into a literal '<' on the client side, and is injected into the tooltip’s innerHTML. Because the Electron renderer is configured with nodeIntegration true, contextIsolation false, and webSecurity false, the payload can invoke child_process requiring arbitrary code execution on the user’s machine. The vulnerability is therefore a client‑side XSS that escalates to remote code execution on the host.
Affected Systems
The affected product is Siyuan, the open‑source personal knowledge management system. Versions prior to 3.7.0 are vulnerable; the issue was fixed in the 3.7.0 release.
Risk and Exploitability
With a CVSS score of 9.4, the flaw is considered critical. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The exploit requires the user to open a maliciously crafted document within the application, which is a high‑impact attack vector for local users. Given the high severity and the ability to execute arbitrary code, the risk remains significant until the patch is applied.
OpenCVE Enrichment
Github GHSA