Plattform
go
Komponente
github.com/siyuan-note/siyuan/kernel
Behoben in
3.6.2
0.0.1
CVE-2026-32767 describes a critical SQL Injection vulnerability discovered in the SiYuan Note kernel, specifically within the /api/search/fullTextSearchBlock endpoint. By manipulating the method parameter, attackers can inject raw SQL queries directly into the application's SQLite database, bypassing authorization checks. This vulnerability affects versions of SiYuan Note up to and including 0.0.0-20260313024916-fd6526133bb3, and has been resolved in version 3.6.1.
The impact of this SQL Injection vulnerability is severe. An authenticated attacker, even with a limited 'Reader' role, can execute arbitrary SQL commands against the SiYuan Note database. This includes SELECT statements to extract sensitive data like user credentials, notes, and attachments. More concerningly, attackers can use DELETE, UPDATE, and DROP TABLE commands to modify or completely destroy data, leading to data loss and service disruption. The ability to execute arbitrary SQL also opens the door to potential privilege escalation and even remote code execution, depending on the database configuration and underlying operating system. This vulnerability shares similarities with other SQL Injection flaws where database access is gained through manipulated input, potentially allowing attackers to gain full control of the application’s data and functionality.
CVE-2026-32767 was publicly disclosed on March 16, 2026. Its CRITICAL CVSS score (9.8) indicates a high probability of exploitation. While no public proof-of-concept (PoC) code has been released as of this writing, the ease of exploitation due to the lack of authorization checks makes it a likely target for attackers. It is not currently listed on CISA KEV, but given its severity, it may be added in the future. Active campaigns targeting SiYuan Note are not currently confirmed, but the vulnerability’s ease of exploitation warrants close monitoring.
Organizations and individuals using SiYuan Note, particularly those with sensitive data stored within the application, are at risk. Shared hosting environments where multiple users share a single SiYuan Note instance are especially vulnerable, as a compromised user account could potentially impact the entire environment. Users relying on legacy configurations or outdated versions of SiYuan Note are also at increased risk.
• linux / server: Monitor SiYuan Note application logs for unusual SQL queries, particularly those involving the /api/search/fullTextSearchBlock endpoint. Use journalctl -u siyuan to filter for relevant log entries.
journalctl -u siyuan | grep '/api/search/fullTextSearchBlock'• database (mysql, redis, mongodb, postgresql): If SiYuan Note uses a database accessible from the server, monitor for suspicious SQL queries. For example, using mysql:
mysql -u <user> -p -e "SHOW PROCESSLIST;"• generic web: Monitor web server access logs for requests to /api/search/fullTextSearchBlock with unusual parameters. Use grep to search for suspicious patterns.
grep '/api/search/fullTextSearchBlock' /var/log/apache2/access.logdiscovery
disclosure
Exploit-Status
EPSS
0.02% (6% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-32767 is to immediately upgrade SiYuan Note to version 3.6.1 or later, which contains the necessary fix. If upgrading is not immediately feasible, consider implementing temporary workarounds. Input validation and sanitization on the /api/search/fullTextSearchBlock endpoint are crucial. Web Application Firewalls (WAFs) configured to detect and block SQL Injection attempts can provide an additional layer of defense. Specifically, WAF rules should be configured to inspect the method parameter for suspicious SQL syntax. Carefully review and restrict database user permissions to minimize the potential damage from a successful attack. After upgrading, confirm the vulnerability is resolved by attempting a SQL Injection payload through the /api/search/fullTextSearchBlock endpoint and verifying that the request is properly rejected.
Aktualisieren Sie SiYuan auf Version 3.6.1 oder höher. Diese Version behebt die Authorization Bypass-Schwachstelle im `/api/search/fullTextSearchBlock` Endpoint und verhindert die Ausführung beliebiger SQL-Anweisungen.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-32767 is a critical SQL injection vulnerability in the SiYuan Note kernel that allows authenticated users to execute arbitrary SQL commands, potentially compromising the entire database.
You are affected if you are using SiYuan Note versions prior to 3.6.1 (≤0.0.0-20260313024916-fd6526133bb3).
Upgrade SiYuan Note to version 3.6.1 or later to remediate the vulnerability. Consider temporary workarounds like input validation if immediate upgrade is not possible.
While no public exploits are currently known, the vulnerability's severity and ease of exploitation suggest it is likely to become a target.
Refer to the official SiYuan Note security advisories on their GitHub repository for the latest information and updates.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine go.mod-Datei hoch und wir sagen dir sofort, ob du betroffen bist.