๐Ÿ” CVE Alert

CVE-2026-40318

HIGH 8.5

SiYuan: Publish Reader Path Traversal Delete via `removeUnusedAttributeView`

CVSS Score
8.5
EPSS Score
0.1%
EPSS Percentile
18th

SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and prior, the /api/av/removeUnusedAttributeView endpoint constructs a filesystem path using the user-controlled id parameter without validation or path boundary enforcement. An attacker can inject path traversal sequences such as ../ into the id value to escape the intended directory and delete arbitrary .json files on the server, including global configuration files and workspace metadata. This issue has been fixed in version 3.6.4.

CWE CWE-24
Vendor siyuan-note
Product siyuan
Published Apr 16, 2026
Last Updated Apr 18, 2026
Stay Ahead of the Next One

Get instant alerts for siyuan-note siyuan

Be the first to know when new high vulnerabilities affecting siyuan-note siyuan are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
High

Affected Versions

siyuan-note / siyuan
< 3.6.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/siyuan-note/siyuan/security/advisories/GHSA-vw86-c94w-v3x4 github.com: https://github.com/siyuan-note/siyuan/releases/tag/v3.6.4