CVE-2026-45147
SiYuan: Broken access control in SiYuan `/api/tag/getTag` โ Reader role can mutate `Conf.Tag.Sort` and persist to disk
SiYuan is an open-source personal knowledge management system. Prior to 3.7.0, POST /api/tag/getTag is registered with model.CheckAuth only, omitting both model.CheckAdminRole and model.CheckReadonly, despite the handler performing a configuration write that is normally guarded by both. Any authenticated user โ including publish-service RoleReader accounts and RoleEditor accounts on a read-only workspace โ can call this endpoint with a sort argument to mutate model.Conf.Tag.Sort and trigger model.Conf.Save(), which atomically rewrites the entire workspace conf.json. This vulnerability is fixed in 3.7.0.
| CWE | CWE-285 CWE-862 |
| Vendor | siyuan-note |
| Product | siyuan |
| Published | May 14, 2026 |
| Last Updated | May 14, 2026 |
Get instant alerts for siyuan-note siyuan
Be the first to know when new medium vulnerabilities affecting siyuan-note siyuan are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N