We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53544

Trilium Notes is Vulnerable to Brute-force Protection Bypass via Initial Sync Seed Retrieval



Description

Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases. In versions below 0.97.0, a brute-force protection bypass in the initial sync seed retrieval endpoint allows unauthenticated attackers to guess the login password without triggering rate limiting. Trilium is a single-user app without a username requirement, and brute-force protection bypass makes exploitation much more feasible. Multiple features provided by Trilium (e.g. MFA, share notes, custom request handler) indicate that Trilium can be exposed to the internet. This is fixed in version 0.97.0.

Reserved 2025-07-02 | Published 2025-08-05 | Updated 2025-08-05 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-307: Improper Restriction of Excessive Authentication Attempts

Product status

< 0.97.0
affected

References

github.com/...rilium/security/advisories/GHSA-hw5p-ff75-327r

github.com/...mmits/04c8f8a1234e8c9f4a87da187180375227b21223

github.com/TriliumNext/Trilium/releases/tag/v0.97.0

cve.org (CVE-2025-53544)

nvd.nist.gov (CVE-2025-53544)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53544

Support options

Helpdesk Chat, Email, Knowledgebase