CVE-2026-32110

SiYuan is a personal knowledge management system. Prior to 3.6.0, the /api/network/forwardProxy endpoint allows authenticated users to make arbitrary HTTP requests from the server. The endpoint accepts a user-controlled URL and makes HTTP requests to it, returning the full response body and headers. There is no URL validation to prevent requests to internal networks, localhost, or cloud metadata services. This vulnerability is fixed in 3.6.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*

History

13 Mar 2026, 16:51

Type Values Removed Values Added
First Time B3log
B3log siyuan
CPE cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*
Summary
  • (es) SiYuan es un sistema de gestión de conocimiento personal. Antes de la 3.6.0, el endpoint /api/network/forwardProxy permite a usuarios autenticados realizar peticiones HTTP arbitrarias desde el servidor. El endpoint acepta una URL controlada por el usuario y realiza peticiones HTTP a ella, devolviendo el cuerpo completo de la respuesta y las cabeceras. No hay validación de URL para prevenir peticiones a redes internas, localhost o servicios de metadatos en la nube. Esta vulnerabilidad está corregida en la 3.6.0.
References () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-56cv-c5p2-j2wg - () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-56cv-c5p2-j2wg - Exploit, Vendor Advisory

11 Mar 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-11 21:16

Updated : 2026-03-13 16:51


NVD link : CVE-2026-32110

Mitre link : CVE-2026-32110

CVE.ORG link : CVE-2026-32110


JSON object : View

Products Affected

b3log

  • siyuan
CWE
CWE-918

Server-Side Request Forgery (SSRF)