Plattform
go
Komponente
github.com/siyuan-note/siyuan/kernel
Behoben in
3.5.11
3.5.10
CVE-2026-30869 is a critical Path Traversal vulnerability discovered in the SiYuan Kernel, a core component of the SiYuan note-taking application. This vulnerability allows attackers to read arbitrary files on the server, potentially exposing sensitive data like configuration files, database credentials, or even source code. The vulnerability affects versions prior to 3.5.10 and has been publicly disclosed. A fix is available in version 3.5.10.
The primary impact of this vulnerability is the ability for an attacker to read any file accessible to the SiYuan process. This includes configuration files containing database passwords, API keys, and other sensitive credentials. Successful exploitation could lead to complete system compromise, data exfiltration, and potential lateral movement within the network. The /export endpoint's design flaw allows attackers to manipulate file paths, bypassing intended access controls. The potential for secret leakage is significant, as attackers could gain access to sensitive information used by the application.
This vulnerability was publicly disclosed on 2026-03-10. While no active exploitation campaigns have been publicly confirmed, the severity of the vulnerability (CVSS 9.3) and the ease of exploitation make it a high-priority target. The availability of a public proof-of-concept is likely, given the nature of Path Traversal vulnerabilities. It is recommended to monitor security advisories and threat intelligence feeds for any signs of exploitation.
Organizations and individuals using SiYuan for note-taking, particularly those hosting their own instances or using self-managed deployments, are at risk. Shared hosting environments where multiple users share the same SiYuan instance are particularly vulnerable, as an attacker could potentially access data belonging to other users.
• linux / server:
find / -name 'siyuan' -type d -exec grep -i '..\s\+' {}/ -print• generic web:
curl -I 'http://your-siyuan-server/export/../../../../etc/passwd' # Check for 200 OK response• wordpress / composer / npm: (Not applicable, as this is a kernel vulnerability) • database (mysql, redis, mongodb, postgresql): (Not applicable) • windows / supply-chain: (Not applicable)
disclosure
Exploit-Status
EPSS
0.58% (69% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-30869 is to immediately upgrade SiYuan Kernel to version 3.5.10 or later. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to block requests to the /export endpoint with suspicious path parameters. Specifically, look for requests containing directory traversal sequences like '..'. Regularly review file permissions to ensure the SiYuan process only has access to the necessary files. Monitor access logs for unusual activity targeting the /export endpoint.
Aktualisieren Sie SiYuan auf Version 3.5.10 oder höher. Diese Version behebt die Path Traversal-Vulnerabilität im /export Endpoint.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-30869 is a critical vulnerability in SiYuan Kernel allowing attackers to read arbitrary files via the /export endpoint, potentially exposing sensitive data.
If you are using SiYuan Kernel versions prior to 3.5.10, you are vulnerable to this Path Traversal attack.
Upgrade SiYuan Kernel to version 3.5.10 or later to remediate the vulnerability. Consider WAF rules as a temporary workaround.
While no active exploitation has been confirmed, the vulnerability's ease of exploitation suggests a potential for future attacks.
Refer to the SiYuan project's official security advisories and release notes for details on this vulnerability and the fix.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine go.mod-Datei hoch und wir sagen dir sofort, ob du betroffen bist.