Siyuan Vulnerabilities

Security vulnerability tracking for B3log Siyuan

Last updated: Mar 10, 2026
Total CVEs

3

Critical

0

With Exploits

1

Last 30 Days

1

Vulnerability Timeline

3 vulnerabilities discovered over time for Siyuan

Severity Distribution

Critical0
0%
High1
33%
Medium2
67%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2026-309267.1

This vulnerability allows low-privilege users to modify existing notebook content in the SiYuan knowledge management system, even though they should only have read-only access. It occurs because the system doesn't properly check user permissions, enabling these users to add new content to documents through a specific API.

b3logsiyuan
Exploit Available
28 days agoMar 10, 2026
CVE-2026-291836.1

This vulnerability allows an attacker to inject malicious JavaScript into the SiYuan web application, which can then execute actions on behalf of a logged-in user if they click on a crafted link. It can be exploited without any authentication, making it particularly dangerous for users who might unknowingly open the link.

b3logsiyuan
Theoretical
about 1 month agoMar 6, 2026
CVE-2026-290735.7

This vulnerability allows any logged-in user, including those with just read access, to execute any SQL query on the database, potentially exposing or altering sensitive data. It affects versions prior to 3.6.0 and is fixed in that version, so users should update to secure their systems.

b3logsiyuan
Theoretical
about 1 month agoMar 6, 2026

About B3log Siyuan Security

This page provides comprehensive security vulnerability tracking for B3log Siyuan. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Siyuan updated to the latest version
  • • Subscribe to security advisories from B3log
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately