Home

Description

SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious note synced to another user can trigger remote code execution in the SiYuan Electron desktop client. The root cause is that table caption content is stored without safe escaping and later unescaped into rendered HTML, creating a stored XSS sink. Because the desktop renderer runs with nodeIntegration enabled and contextIsolation disabled, attacker-controlled JavaScript executes with access to Node.js APIs. In practice, an attacker can import a crafted note into a synced workspace, wait for the victim to sync, and achieve code execution when the victim opens the note. This vulnerability is fixed in 3.6.4.

PUBLISHED Reserved 2026-04-07 | Published 2026-04-07 | Updated 2026-04-08 | Assigner GitHub_M




CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

< 3.6.4
affected

References

github.com/...siyuan/security/advisories/GHSA-phhp-9rm9-6gr2 exploit

github.com/...siyuan/security/advisories/GHSA-phhp-9rm9-6gr2

cve.org (CVE-2026-39846)

nvd.nist.gov (CVE-2026-39846)

Download JSON