CVE-2026-32938: SiYuan
CVE-2026-32938
Attackers can steal SSH keys, password files, and other secrets from desktops running SiYuan 3.6.0 and below. Patch to version 3.6.1 to block file theft.
Patch now - CVE-2026-32938 is a critical file exfiltration vulnerability in SiYuan desktop versions 3.6.0 and below that lets authenticated attackers steal arbitrary files from the host system, including SSH keys and configuration files.
Overview
A critical security vulnerability, identified as CVE-2026-32938, has been discovered in the SiYuan personal knowledge management software. This flaw could allow an authenticated user with access to the publish service to steal sensitive files from the desktop system where SiYuan is running. The issue is present in desktop versions 3.6.0 and below.
Vulnerability Explained
In simple terms, this vulnerability consists of two problematic functions working together. First, when pasting HTML content containing links to local files (using file://), the SiYuan desktop application improperly copies those files into its workspace without checking if the files are sensitive (like system configuration or password files). Second, the application serves these copied files via a web interface that only requires standard user authentication.
An attacker with visitor-level access to a published SiYuan workspace can craft a request that tricks the desktop kernel into copying a sensitive file from anywhere on the system into the workspace’s asset folder. The attacker can then simply request that copied file through the normal asset URL, successfully exfiltrating data that should be inaccessible.
Potential Impact
The impact of this vulnerability is severe (CVSS score: 9.9 - CRITICAL). A successful exploit could lead to:
- Data Exfiltration: Sensitive files from the host computer, such as SSH keys, configuration files, password managers, or documents, can be stolen.
- Privacy Breach: Personal or organizational data managed within or outside of SiYuan could be compromised.
- System Compromise: Access to sensitive system files could be a stepping stone for further attacks on the host machine or network.
For context on the risks of data exposure, recent incidents are detailed in our breach reports.
Remediation and Mitigation
The primary and only complete solution is to apply the official patch.
Immediate Action Required:
- Update SiYuan: Upgrade your SiYuan desktop application to version 3.6.1 or later immediately. This version contains the fix that properly validates file paths against a sensitive-path list, preventing the unauthorized copying.
- Verify Version: Confirm your installation is running version 3.6.1 or newer. The update should be obtained from the official SiYuan website or GitHub repository.
Temporary Mitigation (if update is delayed):
- Restrict Access: If you use the publish feature, consider temporarily disabling external access to published workspaces or restricting them to trusted users only until the update can be applied.
- Monitor for Updates: Stay informed on software patches by following trusted security news sources.
All users of SiYuan versions 3.6.0 and below are urged to treat this with high priority and update without delay to protect their sensitive local data.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-32938?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
SiYuan is a personal knowledge management system. Prior to 3.5.10, a path traversal vulnerability in the /export endpoint allows an attacker to read arbitrary files from the server filesystem. By expl...
SiYuan is a personal knowledge management system. Prior to version 3.6.2, a malicious website can achieve Remote Code Execution (RCE) on any desktop running SiYuan by exploiting the permissive CORS po...
SiYuan is a personal knowledge management system. Prior to version 3.6.2, an attacker who can place a malicious URL in an Attribute View mAsse field can trigger stored XSS when a victim opens the Gall...
SiYuan is a personal knowledge management system. Prior to version 3.5.9, an unauthenticated reflected XSS vulnerability exists in the dynamic icon API endpoint "GET /api/icon/getDynamicIcon" when typ...
Other B3log Siyuan Vulnerabilities
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, Mermaid diagrams are rendered with securityLevel set to "loose", and the resulting SVG is injected into the ...
SiYuan is a personal knowledge management system. Prior to version 3.6.2, a malicious website can achieve Remote Code Execution (RCE) on any desktop running SiYuan by exploiting the permissive CORS po...
SiYuan is a personal knowledge management system. Prior to version 3.6.2, an attacker who can place a malicious URL in an Attribute View mAsse field can trigger stored XSS when a victim opens the Gall...
SiYuan is a personal knowledge management system. Prior to version 3.6.2, a vulnerability allows crafted block attribute values to bypass server-side attribute escaping when an HTML entity is mixed wi...