๐Ÿ” CVE Alert

CVE-2026-32751

UNKNOWN 0.0

SiYuan Vulnerable to Remote Code Execution via Stored XSS in Notebook Name - Mobile Interface

CVSS Score
0.0
EPSS Score
0.4%
EPSS Percentile
58th

SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the mobile file tree (MobileFiles.ts) renders notebook names via innerHTML without HTML escaping when processing renamenotebook WebSocket events. The desktop version (Files.ts) properly uses escapeHtml() for the same operation. An authenticated user who can rename notebooks can inject arbitrary HTML/JavaScript that executes on any mobile client viewing the file tree. Since Electron is configured with nodeIntegration: true and contextIsolation: false, the injected JavaScript has full Node.js access, escalating stored XSS to full remote code execution. The mobile layout is also used in the Electron desktop app when the window is narrow, making this exploitable on desktop as well. This issue has been fixed in version 3.6.1.

CWE CWE-79
Vendor siyuan-note
Product siyuan
Published Mar 19, 2026
Last Updated Mar 24, 2026
Stay Ahead of the Next One

Get instant alerts for siyuan-note siyuan

Be the first to know when new unknown vulnerabilities affecting siyuan-note siyuan are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

siyuan-note / siyuan
< 3.6.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/siyuan-note/siyuan/security/advisories/GHSA-qr46-rcv3-4hq3 github.com: https://github.com/siyuan-note/siyuan/commit/f6d35103f774b65e52f03e018649ff0e57924fb0 github.com: https://github.com/siyuan-note/siyuan/releases/tag/v3.6.1