Plattform
go
Komponente
github.com/siyuan-note/siyuan/kernel
Behoben in
3.5.10
0.0.0-20260304034809-d68bd5a79391
CVE-2026-29183 describes a reflected Cross-Site Scripting (XSS) vulnerability within the SiYuan Kernel, specifically in its dynamic icon API endpoint (/api/icon/getDynamicIcon). This vulnerability allows an unauthenticated attacker to inject malicious code, potentially leading to data exfiltration and unauthorized actions. The vulnerability impacts versions of SiYuan Kernel prior to 0.0.0-20260304034809-d68bd5a79391, and a patch has been released to address the issue.
The XSS vulnerability in SiYuan Kernel’s dynamic icon API is particularly concerning due to its unauthenticated nature. An attacker can craft a malicious URL containing attacker-controlled content within the type=8 parameter. This content is then embedded into the SVG output without proper escaping, allowing the injection of executable SVG/HTML event handlers, such as onerror. Successful exploitation allows the attacker to execute JavaScript within the SiYuan web origin. This can be leveraged to steal sensitive data, impersonate legitimate users, or perform other malicious actions, especially if the victim is a logged-in user who clicks the malicious link. The potential for data exfiltration and account takeover makes this a high-impact vulnerability.
CVE-2026-29183 was publicly disclosed on March 4, 2026. The vulnerability's unauthenticated nature and ease of exploitation suggest a potential for widespread exploitation. While no public proof-of-concept (PoC) has been observed as of the disclosure date, the simplicity of the attack vector makes it likely that PoCs will emerge. The vulnerability is not currently listed on CISA KEV, but its criticality warrants close monitoring. Active campaigns targeting SiYuan users are not currently confirmed, but the risk remains elevated.
Organizations and individuals using SiYuan Kernel are at risk, particularly those who rely on the application for sensitive data management or collaboration. Users who have not implemented proper input validation and output encoding practices are especially vulnerable. Shared hosting environments where multiple users share the same SiYuan instance are also at increased risk, as a single compromised instance could affect all users.
• linux / server: Monitor SiYuan logs for requests to /api/icon/getDynamicIcon with type=8 and suspicious content parameters. Use journalctl -f -u siyuan to monitor logs in real-time.
journalctl -f -u siyuan | grep '/api/icon/getDynamicIcon?type=8'• generic web: Use curl to test the endpoint with a malicious SVG payload and examine the response for signs of code execution.
curl 'http://<siyuan_server>/api/icon/getDynamicIcon?type=8&content=<svg onload=alert("XSS")>' -s• generic web: Check access and error logs for unusual requests to the endpoint. • wordpress / composer / npm: N/A - This vulnerability is specific to the SiYuan Kernel, not a WordPress plugin or Node.js package. • database (mysql, redis, mongodb, postgresql): N/A - This vulnerability does not directly impact database systems. • windows / supply-chain: N/A - This vulnerability does not directly impact Windows systems or supply chains.
disclosure
Exploit-Status
EPSS
0.01% (1% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-29183 is to immediately upgrade SiYuan Kernel to version 0.0.0-20260304034809-d68bd5a79391 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds. Input validation and output encoding on the /api/icon/getDynamicIcon endpoint are crucial. Web Application Firewalls (WAFs) can be configured to detect and block requests containing suspicious SVG content or event handlers. Monitor SiYuan logs for unusual activity, particularly requests to the /api/icon/getDynamicIcon endpoint with unusual parameters. After upgrading, confirm the fix by attempting to trigger the vulnerability with a crafted URL and verifying that the SVG output is properly sanitized and does not execute malicious code.
Aktualisieren Sie SiYuan auf Version 3.5.9 oder höher. Diese Version behebt die XSS-Schwachstelle, die im Endpunkt `/api/icon/getDynamicIcon` mit `type=8` reflektiert wird. Das Update verhindert die Ausführung von beliebigem JavaScript beim Öffnen bösartiger Links.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-29183 is a critical XSS vulnerability in SiYuan Kernel's dynamic icon API, allowing unauthenticated attackers to inject malicious code.
You are affected if you are using a version of SiYuan Kernel prior to 0.0.0-20260304034809-d68bd5a79391.
Upgrade SiYuan Kernel to version 0.0.0-20260304034809-d68bd5a79391 or later. Implement input validation and output encoding as a temporary workaround.
Active exploitation is not currently confirmed, but the vulnerability's ease of exploitation suggests a potential for widespread attacks.
Refer to the official SiYuan project website and security advisories for the latest information and updates.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine go.mod-Datei hoch und wir sagen dir sofort, ob du betroffen bist.