SiYuan is a personal knowledge management system. Prior to 3.6.0, the /api/network/forwardProxy endpoint allows authenticated users to make arbitrary HTTP requests from the server. The endpoint accepts a user-controlled URL and makes HTTP requests to it, returning the full response body and headers. There is no URL validation to prevent requests to internal networks, localhost, or cloud metadata services. This vulnerability is fixed in 3.6.0.
References
| Link | Resource |
|---|---|
| https://github.com/siyuan-note/siyuan/security/advisories/GHSA-56cv-c5p2-j2wg | Exploit Vendor Advisory |
Configurations
History
13 Mar 2026, 16:51
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
B3log
B3log siyuan |
|
| CPE | cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:* | |
| Summary |
|
|
| References | () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-56cv-c5p2-j2wg - Exploit, Vendor Advisory |
11 Mar 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-11 21:16
Updated : 2026-03-13 16:51
NVD link : CVE-2026-32110
Mitre link : CVE-2026-32110
CVE.ORG link : CVE-2026-32110
JSON object : View
Products Affected
b3log
- siyuan
CWE
CWE-918
Server-Side Request Forgery (SSRF)
