CVE-2026-41421

SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, SiYuan desktop renders notification messages as raw HTML inside an Electron renderer. The notification route POST /api/notification/pushMsg accepts a user-controlled msg value, forwards it through the backend broadcast layer, and the frontend inserts it into the DOM with insertAdjacentHTML(...) at message.ts. On desktop builds, this is not limited to ordinary XSS. Electron windows are created with nodeIntegration: true, contextIsolation: false, and webSecurity: false at main.js. As a result, JavaScript executed from the notification sink can directly access Node APIs and escalate to desktop code execution. This vulnerability is fixed in 3.6.5.
Configurations

No configuration.

History

25 Apr 2026, 03:16

Type Values Removed Values Added
References () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-grjj-6f6g-cq8q - () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-grjj-6f6g-cq8q -

24 Apr 2026, 19:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-24 19:17

Updated : 2026-04-25 03:16


NVD link : CVE-2026-41421

Mitre link : CVE-2026-41421

CVE.ORG link : CVE-2026-41421


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')