CVE-2026-29073

SiYuan is a personal knowledge management system. Prior to version 3.6.0, the /api/query/sql lets a user run sql directly, but it only checks basic auth, not admin rights, any logged-in user, even readers, can run any sql query on the database. This issue has been patched in version 3.6.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*

History

10 Mar 2026, 19:04

Type Values Removed Values Added
References () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-jqwg-75qf-vmf9 - () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-jqwg-75qf-vmf9 - Exploit, Vendor Advisory
First Time B3log
B3log siyuan
CPE cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*
Summary
  • (es) SiYuan es un sistema de gestión de conocimiento personal. Antes de la versión 3.6.0, la API /api/query/sql permite a un usuario ejecutar SQL directamente, pero solo verifica la autenticación básica, no los derechos de administrador; cualquier usuario autenticado, incluso los lectores, puede ejecutar cualquier consulta SQL en la base de datos. Este problema ha sido parcheado en la versión 3.6.0.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

06 Mar 2026, 08:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-06 08:16

Updated : 2026-03-10 19:04


NVD link : CVE-2026-29073

Mitre link : CVE-2026-29073

CVE.ORG link : CVE-2026-29073


JSON object : View

Products Affected

b3log

  • siyuan
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

CWE-862

Missing Authorization