CVE-2026-29183: SiYuan XSS — Critical — Patch Now
CVE-2026-29183
SiYuan is a personal knowledge management system. Prior to version 3.5.9, an unauthenticated reflected XSS vulnerability exists in the dynamic icon API endpoint "GET /api/icon/getDynamicIcon" when typ...
Overview
A critical security vulnerability has been identified in the SiYuan personal knowledge management software. This flaw allows an unauthenticated attacker to execute malicious code within a user’s SiYuan web interface simply by tricking them into clicking a specially crafted link.
Vulnerability Details
In SiYuan versions prior to 3.5.9, a specific API endpoint (/api/icon/getDynamicIcon) is accessible without any login. This endpoint generates SVG image files. Due to insufficient input sanitization when using type=8, attacker-controlled data is embedded directly into the SVG output without proper escaping. Since the server returns this content with an image/svg+xml header, modern web browsers treat it as an active web document.
An attacker can craft a URL that injects malicious SVG/HTML event handlers, such as onerror, into the generated icon. This allows arbitrary JavaScript code to run within the security context (origin) of the SiYuan application itself.
Potential Impact
The severity of this vulnerability is CRITICAL (CVSS Score: 9.3). Successful exploitation can lead to:
- Full Account Compromise: The injected JavaScript can perform any action as the logged-in user, including making authenticated API calls.
- Data Theft and Exfiltration: An attacker can steal all notes, documents, and sensitive information stored within the user’s SiYuan workspace.
- Further System Attacks: The compromised access could be used as a foothold for attacks on connected systems or data.
This type of client-side attack is a common vector in broader data breaches. You can review patterns of such incidents in our breach reports.
Remediation and Mitigation
Immediate action is required to secure affected systems.
Primary Remediation:
- Upgrade Immediately: All users must upgrade to SiYuan version 3.5.9 or later, which contains the patch for this vulnerability. This is the only complete solution.
Temporary Mitigation (If Upgrade is Delayed):
- User Awareness: Advise all users to exercise extreme caution with links related to their SiYuan instance. Do not click on unexpected or suspicious links.
- Network Controls: Consider implementing web application firewall (WAF) rules to block requests containing malicious SVG/HTML event handler patterns targeting the vulnerable endpoint.
For the latest updates on such threats, follow our security news. System administrators should prioritize this update to prevent potential data loss and unauthorized access.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-29183?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
SiYuan is a personal knowledge management system. Prior to version 3.6.2, an attacker who can place a malicious URL in an Attribute View mAsse field can trigger stored XSS when a victim opens the Gall...
SiYuan is a personal knowledge management system. Prior to version 3.6.2, a vulnerability allows crafted block attribute values to bypass server-side attribute escaping when an HTML entity is mixed wi...
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerab...
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerab...