Plateforme
go
Composant
github.com/siyuan-note/siyuan/kernel
Corrigé dans
3.5.10
0.0.0-20260304034809-d68bd5a79391
CVE-2026-29183 describes a reflected Cross-Site Scripting (XSS) vulnerability within the SiYuan Kernel, specifically in its dynamic icon API endpoint (/api/icon/getDynamicIcon). This vulnerability allows an unauthenticated attacker to inject malicious code, potentially leading to data exfiltration and unauthorized actions. The vulnerability impacts versions of SiYuan Kernel prior to 0.0.0-20260304034809-d68bd5a79391, and a patch has been released to address the issue.
The XSS vulnerability in SiYuan Kernel’s dynamic icon API is particularly concerning due to its unauthenticated nature. An attacker can craft a malicious URL containing attacker-controlled content within the type=8 parameter. This content is then embedded into the SVG output without proper escaping, allowing the injection of executable SVG/HTML event handlers, such as onerror. Successful exploitation allows the attacker to execute JavaScript within the SiYuan web origin. This can be leveraged to steal sensitive data, impersonate legitimate users, or perform other malicious actions, especially if the victim is a logged-in user who clicks the malicious link. The potential for data exfiltration and account takeover makes this a high-impact vulnerability.
CVE-2026-29183 was publicly disclosed on March 4, 2026. The vulnerability's unauthenticated nature and ease of exploitation suggest a potential for widespread exploitation. While no public proof-of-concept (PoC) has been observed as of the disclosure date, the simplicity of the attack vector makes it likely that PoCs will emerge. The vulnerability is not currently listed on CISA KEV, but its criticality warrants close monitoring. Active campaigns targeting SiYuan users are not currently confirmed, but the risk remains elevated.
Organizations and individuals using SiYuan Kernel are at risk, particularly those who rely on the application for sensitive data management or collaboration. Users who have not implemented proper input validation and output encoding practices are especially vulnerable. Shared hosting environments where multiple users share the same SiYuan instance are also at increased risk, as a single compromised instance could affect all users.
• linux / server: Monitor SiYuan logs for requests to /api/icon/getDynamicIcon with type=8 and suspicious content parameters. Use journalctl -f -u siyuan to monitor logs in real-time.
journalctl -f -u siyuan | grep '/api/icon/getDynamicIcon?type=8'• generic web: Use curl to test the endpoint with a malicious SVG payload and examine the response for signs of code execution.
curl 'http://<siyuan_server>/api/icon/getDynamicIcon?type=8&content=<svg onload=alert("XSS")>' -s• generic web: Check access and error logs for unusual requests to the endpoint. • wordpress / composer / npm: N/A - This vulnerability is specific to the SiYuan Kernel, not a WordPress plugin or Node.js package. • database (mysql, redis, mongodb, postgresql): N/A - This vulnerability does not directly impact database systems. • windows / supply-chain: N/A - This vulnerability does not directly impact Windows systems or supply chains.
disclosure
Statut de l'Exploit
EPSS
0.01% (percentile 1%)
CISA SSVC
Vecteur CVSS
The primary mitigation for CVE-2026-29183 is to immediately upgrade SiYuan Kernel to version 0.0.0-20260304034809-d68bd5a79391 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds. Input validation and output encoding on the /api/icon/getDynamicIcon endpoint are crucial. Web Application Firewalls (WAFs) can be configured to detect and block requests containing suspicious SVG content or event handlers. Monitor SiYuan logs for unusual activity, particularly requests to the /api/icon/getDynamicIcon endpoint with unusual parameters. After upgrading, confirm the fix by attempting to trigger the vulnerability with a crafted URL and verifying that the SVG output is properly sanitized and does not execute malicious code.
Mettez à jour SiYuan à la version 3.5.9 ou supérieure. Cette version corrige la vulnérabilité XSS reflétée dans le point de terminaison `/api/icon/getDynamicIcon` avec `type=8`. La mise à jour empêchera l'exécution de JavaScript arbitraire lors de l'ouverture de liens malveillants.
Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.
CVE-2026-29183 is a critical XSS vulnerability in SiYuan Kernel's dynamic icon API, allowing unauthenticated attackers to inject malicious code.
You are affected if you are using a version of SiYuan Kernel prior to 0.0.0-20260304034809-d68bd5a79391.
Upgrade SiYuan Kernel to version 0.0.0-20260304034809-d68bd5a79391 or later. Implement input validation and output encoding as a temporary workaround.
Active exploitation is not currently confirmed, but the vulnerability's ease of exploitation suggests a potential for widespread attacks.
Refer to the official SiYuan project website and security advisories for the latest information and updates.
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.
Téléverse ton fichier go.mod et nous te dirons instantanément si tu es affecté.