CVE-2026-29183: SiYuan XSS — Critical — Patch Now
CVE-2026-29183
Critical XSS in SiYuan prior to 3.5.9 lets attackers steal all notes and accounts via a malicious link. Patch now to version 3.5.9.
Patch now - CVE-2026-29183 is a critical XSS in SiYuan prior to 3.5.9 that grants unauthenticated attackers full account takeover and data theft by tricking a user into clicking a specially crafted link. Upgrade to version 3.5.9 to remediate.
Overview
A critical security vulnerability has been identified in the SiYuan personal knowledge management software. This flaw allows an unauthenticated attacker to execute malicious code within a user’s SiYuan web interface simply by tricking them into clicking a specially crafted link.
Vulnerability Details
In SiYuan versions prior to 3.5.9, a specific API endpoint (/api/icon/getDynamicIcon) is accessible without any login. This endpoint generates SVG image files. Due to insufficient input sanitization when using type=8, attacker-controlled data is embedded directly into the SVG output without proper escaping. Since the server returns this content with an image/svg+xml header, modern web browsers treat it as an active web document.
An attacker can craft a URL that injects malicious SVG/HTML event handlers, such as onerror, into the generated icon. This allows arbitrary JavaScript code to run within the security context (origin) of the SiYuan application itself.
Potential Impact
The severity of this vulnerability is CRITICAL (CVSS Score: 9.3). Successful exploitation can lead to:
- Full Account Compromise: The injected JavaScript can perform any action as the logged-in user, including making authenticated API calls.
- Data Theft and Exfiltration: An attacker can steal all notes, documents, and sensitive information stored within the user’s SiYuan workspace.
- Further System Attacks: The compromised access could be used as a foothold for attacks on connected systems or data.
This type of client-side attack is a common vector in broader data breaches. You can review patterns of such incidents in our breach reports.
Remediation and Mitigation
Immediate action is required to secure affected systems.
Primary Remediation:
- Upgrade Immediately: All users must upgrade to SiYuan version 3.5.9 or later, which contains the patch for this vulnerability. This is the only complete solution.
Temporary Mitigation (If Upgrade is Delayed):
- User Awareness: Advise all users to exercise extreme caution with links related to their SiYuan instance. Do not click on unexpected or suspicious links.
- Network Controls: Consider implementing web application firewall (WAF) rules to block requests containing malicious SVG/HTML event handler patterns targeting the vulnerable endpoint.
For the latest updates on such threats, follow our security news. System administrators should prioritize this update to prevent potential data loss and unauthorized access.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-29183?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
SiYuan is a personal knowledge management system. Prior to version 3.6.2, an attacker who can place a malicious URL in an Attribute View mAsse field can trigger stored XSS when a victim opens the Gall...
SiYuan is a personal knowledge management system. Prior to version 3.6.2, a vulnerability allows crafted block attribute values to bypass server-side attribute escaping when an HTML entity is mixed wi...
SiYuan is a personal knowledge management system. In versions 3.6.0 and below, SanitizeSVG has an incomplete blocklist — it blocks data:text/html and data:image/svg+xml in href attributes but misses d...
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, Mermaid diagrams are rendered with securityLevel set to "loose", and the resulting SVG is injected into the ...
Other B3log Siyuan Vulnerabilities
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, Mermaid diagrams are rendered with securityLevel set to "loose", and the resulting SVG is injected into the ...
SiYuan is a personal knowledge management system. Prior to version 3.6.2, a malicious website can achieve Remote Code Execution (RCE) on any desktop running SiYuan by exploiting the permissive CORS po...
SiYuan is a personal knowledge management system. Prior to version 3.6.2, an attacker who can place a malicious URL in an Attribute View mAsse field can trigger stored XSS when a victim opens the Gall...
SiYuan is a personal knowledge management system. Prior to version 3.6.2, a vulnerability allows crafted block attribute values to bypass server-side attribute escaping when an HTML entity is mixed wi...