CVE-2026-33194

SiYuan is a personal knowledge management system. Prior to version 3.6.2, the `IsSensitivePath()` function in `kernel/util/path.go` uses a denylist approach that was recently expanded (GHSA-h5vh-m7fg-w5h6, commit 9914fd1) but remains incomplete. Multiple security-relevant Linux directories are not blocked, including `/opt` (application data), `/usr` (local configs/binaries), `/home` (other users), `/mnt` and `/media` (mounted volumes). The `globalCopyFiles` and `importStdMd` endpoints rely on `IsSensitivePath` as their primary defense against reading files outside the workspace. Version 3.6.2 contains an updated fix.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*

History

23 Mar 2026, 18:53

Type Values Removed Values Added
References () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-vm69-h85x-8p85 - () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-vm69-h85x-8p85 - Exploit, Mitigation, Vendor Advisory
First Time B3log
B3log siyuan
CPE cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*

20 Mar 2026, 23:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-20 23:16

Updated : 2026-03-23 18:53


NVD link : CVE-2026-33194

Mitre link : CVE-2026-33194

CVE.ORG link : CVE-2026-33194


JSON object : View

Products Affected

b3log

  • siyuan
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')