๐Ÿ” CVE Alert

CVE-2026-40259

HIGH 8.1

SiYuan: Publish Reader Can Arbitrarily Delete Attribute View Files via removeUnusedAttributeView API

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, the /api/av/removeUnusedAttributeView endpoint is protected only by generic authentication that accepts publish-service RoleReader tokens. The handler passes a caller-controlled id directly to a model function that unconditionally deletes the corresponding attribute view file from the workspace without verifying that the caller has write privileges or that the target attribute view is actually unused. An authenticated publish-service reader can permanently delete arbitrary attribute view definitions by extracting publicly exposed data-av-id values from published content, causing breakage of database views and workspace rendering until manually restored. This issue has been fixed in version 3.6.4.

CWE CWE-285
Vendor siyuan-note
Product siyuan
Published Apr 16, 2026
Last Updated Apr 16, 2026
Stay Ahead of the Next One

Get instant alerts for siyuan-note siyuan

Be the first to know when new high vulnerabilities affecting siyuan-note siyuan are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High

Affected Versions

siyuan-note / siyuan
< 0.0.0-20260407035653-2f416e5253f1 < 3.6.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/siyuan-note/siyuan/security/advisories/GHSA-7m5h-w69j-qggg github.com: https://github.com/siyuan-note/siyuan/releases/tag/v3.6.4