SiYuan is a personal knowledge management system. Prior to 3.5.10, a privilege escalation vulnerability exists in the publish service of SiYuan Note that allows low-privilege publish accounts (RoleReader) to modify notebook content via the /api/block/appendHeadingChildren API endpoint. The endpoint requires only the model.CheckAuth role, which accepts RoleReader sessions, but it does not enforce stricter checks, such as CheckAdminRole or CheckReadonly. This allows remote authenticated publish users with read-only privileges to append new blocks to existing documents, compromising the integrity of stored notes.
References
| Link | Resource |
|---|---|
| https://github.com/siyuan-note/siyuan/security/advisories/GHSA-f9cq-v43p-v523 | Exploit Vendor Advisory |
| https://github.com/siyuan-note/siyuan/security/advisories/GHSA-f9cq-v43p-v523 | Exploit Vendor Advisory |
Configurations
History
13 Mar 2026, 17:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
B3log
B3log siyuan |
|
| CPE | cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:* | |
| References | () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-f9cq-v43p-v523 - Exploit, Vendor Advisory |
10 Mar 2026, 18:18
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-f9cq-v43p-v523 - |
10 Mar 2026, 07:44
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-10 07:44
Updated : 2026-03-13 17:06
NVD link : CVE-2026-30926
Mitre link : CVE-2026-30926
CVE.ORG link : CVE-2026-30926
JSON object : View
Products Affected
b3log
- siyuan
