Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67488: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in siyuan-note siyuan

0
High
VulnerabilityCVE-2025-67488cvecve-2025-67488cwe-22
Published: Tue Dec 09 2025 (12/09/2025, 20:32:37 UTC)
Source: CVE Database V5
Vendor/Project: siyuan-note
Product: siyuan

Description

SiYuan is self-hosted, open source personal knowledge management software. Versions 0.0.0-20251202123337-6ef83b42c7ce and below contain function importZipMd which is vulnerable to ZipSlips, allowing an authenticated user to overwrite files on the system. An authenticated user with access to the import functionality in notes is able to overwrite any file on the system, and can escalate to full code execution under some circumstances. A fix is planned for version 3.5.0.

AI-Powered Analysis

AILast updated: 12/09/2025, 20:43:20 UTC

Technical Analysis

CVE-2025-67488 is a path traversal vulnerability classified under CWE-22, affecting the SiYuan personal knowledge management software. The vulnerability resides in the importZipMd function, which processes ZIP archive imports. Due to improper validation of file paths within the ZIP archive, an authenticated user can craft a malicious ZIP file that, when imported, extracts files outside the intended directory. This ZipSlip attack allows overwriting arbitrary files on the host filesystem, including critical system or application files. Under some circumstances, this can escalate to full code execution, enabling an attacker to execute arbitrary commands with the privileges of the SiYuan process. The vulnerability requires the attacker to be authenticated and to interact with the import feature, which somewhat limits the attack surface but still poses a significant risk. The affected versions include all releases up to 0.0.0-20251202123337-6ef83b42c7ce, with a fix planned for version 3.5.0. The CVSS v3.1 score is 7.8 (High), reflecting high confidentiality, integrity, and availability impacts, with low attack complexity but requiring user interaction and authentication. No public exploits are known at this time, but the vulnerability's nature makes it a critical concern for environments where SiYuan is deployed, especially in multi-user or sensitive contexts.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of systems running SiYuan. An attacker with valid credentials can overwrite arbitrary files, potentially leading to data loss, unauthorized data disclosure, or system compromise. In environments where SiYuan is used to manage sensitive knowledge or intellectual property, this could result in severe information leakage or sabotage. The possibility of full code execution means attackers could pivot to other internal systems, escalate privileges, or deploy persistent malware. Organizations in sectors such as government, research, and critical infrastructure that rely on SiYuan for knowledge management are particularly vulnerable. The requirement for authentication limits exposure but does not eliminate risk, especially if user credentials are compromised or if insider threats exist. The absence of known exploits currently provides a window for remediation, but the high severity score demands urgent attention.

Mitigation Recommendations

European organizations should immediately audit their SiYuan deployments to identify affected versions and restrict access to the importZipMd functionality to trusted and minimal user groups. Applying the forthcoming patch in version 3.5.0 as soon as it is released is critical. Until patched, organizations should consider disabling the ZIP import feature or implementing strict input validation and sandboxing around the import process to prevent directory traversal. Monitoring and logging import activities can help detect suspicious attempts. Employing strong authentication mechanisms, including multi-factor authentication, reduces the risk of unauthorized access. Regular backups of critical data and system files will mitigate the impact of potential file overwrites. Network segmentation and least privilege principles should be enforced to limit the scope of compromise if exploitation occurs. Finally, educating users about the risks of importing untrusted ZIP files can reduce inadvertent exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-08T18:02:08.847Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693888a8f4a79be77cce2017

Added to database: 12/9/2025, 8:38:00 PM

Last enriched: 12/9/2025, 8:43:20 PM

Last updated: 12/10/2025, 9:02:29 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats