CVE-2026-30926
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows low-privilege users to modify existing notebook content in the SiYuan knowledge management system, even though they should only have read-only access. It occurs because the system doesn't properly check user permissions, enabling these users to add new content to documents through a specific API.
Technical Description
SiYuan is a personal knowledge management system. Prior to 3.5.10, a privilege escalation vulnerability exists in the publish service of SiYuan Note that allows low-privilege publish accounts (RoleReader) to modify notebook content via the /api/block/appendHeadingChildren API endpoint. The endpoint requires only the model.CheckAuth role, which accepts RoleReader sessions, but it does not enforce stricter checks, such as CheckAdminRole or CheckReadonly. This allows remote authenticated publish users with read-only privileges to append new blocks to existing documents, compromising the integrity of stored notes.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 10, 2026
28 days ago
Last Modified
Mar 13, 2026
25 days ago
Vendor
b3log
Product
siyuan
Related Vulnerabilities
This vulnerability allows an attacker to inject malicious JavaScript into the SiYuan web application, which can then execute actions on behalf of a logged-in user if they click on a crafted link. It can be exploited without any authentication, making it particularly dangerous for users who might unknowingly open the link.
This vulnerability allows any logged-in user, including those with just read access, to execute any SQL query on the database, potentially exposing or altering sensitive data. It affects versions prior to 3.6.0 and is fixed in that version, so users should update to secure their systems.