CVE-2026-34585

SiYuan is a personal knowledge management system. Prior to version 3.6.2, a vulnerability allows crafted block attribute values to bypass server-side attribute escaping when an HTML entity is mixed with raw special characters. An attacker can embed a malicious IAL value inside a .sy document, package it as a .sy.zip, and have the victim import it through the normal Import -> SiYuan .sy.zip workflow. Once the note is opened, the malicious attribute breaks out of its original HTML context and injects an event handler, resulting in stored XSS. In the Electron desktop client, this XSS reaches remote code execution because injected JavaScript runs with access to Node/Electron APIs. This issue has been patched in version 3.6.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*

History

03 Apr 2026, 16:52

Type Values Removed Values Added
CPE cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*
First Time B3log
B3log siyuan
Summary
  • (es) SiYuan es un sistema de gestión de conocimiento personal. Antes de la versión 3.6.2, una vulnerabilidad permite que valores de atributos de bloque manipulados eludan el escape de atributos del lado del servidor cuando una entidad HTML se mezcla con caracteres especiales sin procesar. Un atacante puede incrustar un valor IAL malicioso dentro de un documento .sy, empaquetarlo como un .sy.zip, y hacer que la víctima lo importe a través del flujo de trabajo normal de Importar -> SiYuan .sy.zip. Una vez que se abre la nota, el atributo malicioso sale de su contexto HTML original e inyecta un gestor de eventos, resultando en XSS almacenado. En el cliente de escritorio Electron, este XSS alcanza la ejecución remota de código porque el JavaScript inyectado se ejecuta con acceso a las API de Node/Electron. Este problema ha sido parcheado en la versión 3.6.2.
References () https://github.com/siyuan-note/siyuan/issues/17246 - () https://github.com/siyuan-note/siyuan/issues/17246 - Issue Tracking
References () https://github.com/siyuan-note/siyuan/releases/tag/v3.6.2 - () https://github.com/siyuan-note/siyuan/releases/tag/v3.6.2 - Release Notes
References () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-ff66-236v-p4fg - () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-ff66-236v-p4fg - Exploit, Vendor Advisory

01 Apr 2026, 14:16

Type Values Removed Values Added
References () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-ff66-236v-p4fg - () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-ff66-236v-p4fg -

31 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 22:16

Updated : 2026-04-03 16:52


NVD link : CVE-2026-34585

Mitre link : CVE-2026-34585

CVE.ORG link : CVE-2026-34585


JSON object : View

Products Affected

b3log

  • siyuan
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')