Critical (9.3)

CVE-2026-29183: SiYuan XSS — Critical — Patch Now

CVE-2026-29183

SiYuan is a personal knowledge management system. Prior to version 3.5.9, an unauthenticated reflected XSS vulnerability exists in the dynamic icon API endpoint "GET /api/icon/getDynamicIcon" when typ...

Overview

A critical security vulnerability has been identified in the SiYuan personal knowledge management software. This flaw allows an unauthenticated attacker to execute malicious code within a user’s SiYuan web interface simply by tricking them into clicking a specially crafted link.

Vulnerability Details

In SiYuan versions prior to 3.5.9, a specific API endpoint (/api/icon/getDynamicIcon) is accessible without any login. This endpoint generates SVG image files. Due to insufficient input sanitization when using type=8, attacker-controlled data is embedded directly into the SVG output without proper escaping. Since the server returns this content with an image/svg+xml header, modern web browsers treat it as an active web document.

An attacker can craft a URL that injects malicious SVG/HTML event handlers, such as onerror, into the generated icon. This allows arbitrary JavaScript code to run within the security context (origin) of the SiYuan application itself.

Potential Impact

The severity of this vulnerability is CRITICAL (CVSS Score: 9.3). Successful exploitation can lead to:

  • Full Account Compromise: The injected JavaScript can perform any action as the logged-in user, including making authenticated API calls.
  • Data Theft and Exfiltration: An attacker can steal all notes, documents, and sensitive information stored within the user’s SiYuan workspace.
  • Further System Attacks: The compromised access could be used as a foothold for attacks on connected systems or data.

This type of client-side attack is a common vector in broader data breaches. You can review patterns of such incidents in our breach reports.

Remediation and Mitigation

Immediate action is required to secure affected systems.

Primary Remediation:

  • Upgrade Immediately: All users must upgrade to SiYuan version 3.5.9 or later, which contains the patch for this vulnerability. This is the only complete solution.

Temporary Mitigation (If Upgrade is Delayed):

  • User Awareness: Advise all users to exercise extreme caution with links related to their SiYuan instance. Do not click on unexpected or suspicious links.
  • Network Controls: Consider implementing web application firewall (WAF) rules to block requests containing malicious SVG/HTML event handler patterns targeting the vulnerable endpoint.

For the latest updates on such threats, follow our security news. System administrators should prioritize this update to prevent potential data loss and unauthorized access.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Am I Affected by CVE-2026-29183?

Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.

Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.