๐Ÿ” CVE Alert

CVE-2026-32767

CRITICAL 9.8

SiYuan: Authorization Bypass Allows Arbitrary SQL Execution via Search API

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
14th

SiYuan is a personal knowledge management system. Versions 3.6.0 and below contain an authorization bypass vulnerability in the /api/search/fullTextSearchBlock endpoint. When the method parameter is set to 2, the endpoint passes user-supplied input directly as a raw SQL statement to the underlying SQLite database without any authorization or read-only checks. This allows any authenticated user โ€” including those with the Reader role โ€” to execute arbitrary SQL statements (SELECT, DELETE, UPDATE, DROP TABLE, etc.) against the application's database. This is inconsistent with the application's own security model: the dedicated SQL endpoint (/api/query/sql) correctly requires both CheckAdminRole and CheckReadonly middleware, but the search endpoint bypasses these controls entirely. This issue has been fixed in version 3.6.1.

CWE CWE-89 CWE-863
Vendor siyuan-note
Product siyuan
Published Mar 20, 2026
Last Updated Mar 20, 2026
Stay Ahead of the Next One

Get instant alerts for siyuan-note siyuan

Be the first to know when new critical vulnerabilities affecting siyuan-note siyuan are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

siyuan-note / siyuan
< 3.6.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/siyuan-note/siyuan/security/advisories/GHSA-j7wh-x834-p3r7 github.com: https://github.com/siyuan-note/siyuan/issues/17209 github.com: https://github.com/siyuan-note/siyuan/commit/d5e2d0bce0dffef5f61bd8066954bc2d41181fc5 github.com: https://github.com/siyuan-note/siyuan/releases/tag/v3.6.1