๐Ÿ” CVE Alert

CVE-2026-32747

MEDIUM 6.8

SiYuan: Incomplete sensitive path blocklist in globalCopyFiles allows reading /proc and Docker secrets

CVSS Score
6.8
EPSS Score
0.0%
EPSS Percentile
11th

SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the globalCopyFiles API eads source files using filepath.Abs() with no workspace boundary check, relying solely on util.IsSensitivePath() whose blocklist omits /proc/, /run/secrets/, and home directory dotfiles. An admin can copy /proc/1/environ or Docker secrets into the workspace and read them via the standard file API. An admin can exfiltrate any file readable by the SiYuan process that falls outside the incomplete blocklist. In containerized deployments this includes all injected secrets and environment variables - a common pattern for passing credentials to containers. The exfiltrated files are then accessible via the standard workspace file API and persist until manually deleted. This issue has been fixed in version 3.6.1.

CWE CWE-22 CWE-184
Vendor siyuan-note
Product siyuan
Published Mar 19, 2026
Last Updated Mar 20, 2026
Stay Ahead of the Next One

Get instant alerts for siyuan-note siyuan

Be the first to know when new medium vulnerabilities affecting siyuan-note siyuan are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

siyuan-note / siyuan
< 3.6.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/siyuan-note/siyuan/security/advisories/GHSA-h5vh-m7fg-w5h6 github.com: https://github.com/siyuan-note/siyuan/commit/9914fd1d39e5f0a8dcc9fb587e1c0b46f31490a1 github.com: https://github.com/siyuan-note/siyuan/releases/tag/v3.6.1