๐Ÿ” CVE Alert

CVE-2026-41894

UNKNOWN 0.0

SiYuan: Incomplete Fix Bypass for CVE-2026-30869: Path Traversal via Double URL Encoding in `/export/` Endpoint

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, the fix for CVE-2026-30869 only added a denylist check (IsSensitivePath) but did not address the root cause โ€” a redundant url.PathUnescape() call in serveExport(). An authenticated attacker can use double URL encoding (%252e%252e) to traverse directories and read arbitrary workspace files including the full SQLite database (siyuan.db), kernel log, and all user documents. This vulnerability is fixed in 3.6.5.

CWE CWE-22
Vendor siyuan-note
Product siyuan
Published Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for siyuan-note siyuan

Be the first to know when new unknown vulnerabilities affecting siyuan-note siyuan are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

siyuan-note / siyuan
< 3.6.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/siyuan-note/siyuan/security/advisories/GHSA-hjh7-r5w8-5872 github.com: https://github.com/siyuan-note/siyuan/commit/bb481e1290c4a34255652ede85a546504505d2a7 github.com: https://github.com/siyuan-note/siyuan/releases/tag/v3.6.5