CVE-2026-32938: SiYuan
CVE-2026-32938
SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the /api/lute/html2BlockDOM on the desktop copies local files pointed to by file:// links in pasted HTML into the workspa...
Overview
A critical security vulnerability, identified as CVE-2026-32938, has been discovered in the SiYuan personal knowledge management software. This flaw could allow an authenticated user with access to the publish service to steal sensitive files from the desktop system where SiYuan is running. The issue is present in desktop versions 3.6.0 and below.
Vulnerability Explained
In simple terms, this vulnerability consists of two problematic functions working together. First, when pasting HTML content containing links to local files (using file://), the SiYuan desktop application improperly copies those files into its workspace without checking if the files are sensitive (like system configuration or password files). Second, the application serves these copied files via a web interface that only requires standard user authentication.
An attacker with visitor-level access to a published SiYuan workspace can craft a request that tricks the desktop kernel into copying a sensitive file from anywhere on the system into the workspace’s asset folder. The attacker can then simply request that copied file through the normal asset URL, successfully exfiltrating data that should be inaccessible.
Potential Impact
The impact of this vulnerability is severe (CVSS score: 9.9 - CRITICAL). A successful exploit could lead to:
- Data Exfiltration: Sensitive files from the host computer, such as SSH keys, configuration files, password managers, or documents, can be stolen.
- Privacy Breach: Personal or organizational data managed within or outside of SiYuan could be compromised.
- System Compromise: Access to sensitive system files could be a stepping stone for further attacks on the host machine or network.
For context on the risks of data exposure, recent incidents are detailed in our breach reports.
Remediation and Mitigation
The primary and only complete solution is to apply the official patch.
Immediate Action Required:
- Update SiYuan: Upgrade your SiYuan desktop application to version 3.6.1 or later immediately. This version contains the fix that properly validates file paths against a sensitive-path list, preventing the unauthorized copying.
- Verify Version: Confirm your installation is running version 3.6.1 or newer. The update should be obtained from the official SiYuan website or GitHub repository.
Temporary Mitigation (if update is delayed):
- Restrict Access: If you use the publish feature, consider temporarily disabling external access to published workspaces or restricting them to trusted users only until the update can be applied.
- Monitor for Updates: Stay informed on software patches by following trusted security news sources.
All users of SiYuan versions 3.6.0 and below are urged to treat this with high priority and update without delay to protect their sensitive local data.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-32938?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
SiYuan is a personal knowledge management system. Prior to 3.5.10, a path traversal vulnerability in the /export endpoint allows an attacker to read arbitrary files from the server filesystem. By expl...
A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit...
A malicious actor with access to the UniFi Play network could exploit a Path Traversal vulnerability found in the device firmware to write files on the system that could be used for a remote code exec...
ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenticated administrators to upload arbitrary...