Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23645: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in siyuan-note siyuan

0
Medium
VulnerabilityCVE-2026-23645cvecve-2026-23645cwe-79
Published: Fri Jan 16 2026 (01/16/2026, 19:20:06 UTC)
Source: CVE Database V5
Vendor/Project: siyuan-note
Product: siyuan

Description

CVE-2026-23645 is a stored Cross-Site Scripting (XSS) vulnerability in SiYuan Note versions prior to 3. 5. 4-dev2. The flaw arises because the application fails to sanitize uploaded SVG files, allowing malicious JavaScript embedded in SVGs to execute in the context of an authenticated user's session. Exploitation requires a user to upload and then view a crafted SVG file, leading to arbitrary script execution without requiring authentication or elevated privileges. The vulnerability has a CVSS 4. 0 base score of 5. 3, indicating medium severity. There are no known exploits in the wild as of now. European organizations using SiYuan Note for personal knowledge management should upgrade to version 3.

AI-Powered Analysis

AILast updated: 01/23/2026, 20:35:13 UTC

Technical Analysis

CVE-2026-23645 is a stored Cross-Site Scripting (XSS) vulnerability identified in SiYuan Note, an open-source, self-hosted personal knowledge management software. The vulnerability exists in versions prior to 3.5.4-dev2 due to improper sanitization of uploaded SVG files. SVG files can contain embedded JavaScript, and when a malicious SVG is uploaded and subsequently viewed by an authenticated user, the embedded script executes within the user's session context. This allows an attacker to perform arbitrary JavaScript execution, potentially leading to session hijacking, credential theft, or unauthorized actions within the application. The vulnerability does not require any authentication or privileges to exploit, only that a user views the malicious SVG. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and low scope impact (S:C), resulting in a medium severity score of 5.3. While no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the common use of SVG files and the potential for social engineering to induce users to view malicious content. The issue was addressed in version 3.5.4-dev2 by implementing proper sanitization of SVG uploads to neutralize embedded scripts. Organizations using SiYuan Note should prioritize upgrading to the patched version to eliminate this attack vector.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on SiYuan Note for knowledge management and collaboration. Successful exploitation can lead to session hijacking, unauthorized data access, and potential lateral movement within internal networks. Confidentiality is at risk as attackers can steal sensitive information accessible through the user's session. Integrity may be compromised if attackers perform unauthorized actions or inject malicious content. Availability impact is limited but could occur if attackers disrupt user sessions or application functionality. Given that exploitation requires user interaction (viewing a malicious SVG), the risk is mitigated somewhat but remains notable due to the ease of embedding SVGs in documents and messages. European organizations with decentralized IT environments or those encouraging self-hosted solutions may be more exposed. The medium CVSS score reflects a moderate risk that should not be ignored, especially in sectors handling sensitive or regulated data. Attackers could leverage this vulnerability as an initial foothold or as part of a broader attack chain targeting knowledge management systems.

Mitigation Recommendations

1. Upgrade SiYuan Note to version 3.5.4-dev2 or later immediately to apply the official fix that sanitizes SVG uploads. 2. Implement strict file upload policies restricting SVG uploads to trusted users or disabling SVG uploads entirely if not required. 3. Employ server-side SVG sanitization tools that remove or neutralize embedded scripts before storage or rendering. 4. Educate users on the risks of opening untrusted SVG files and encourage caution with files from unknown sources. 5. Monitor application logs for unusual upload or viewing activity related to SVG files. 6. Use Content Security Policy (CSP) headers to restrict script execution contexts and reduce the impact of potential XSS attacks. 7. Consider isolating the SiYuan Note environment or running it in a sandboxed container to limit the scope of compromise. 8. Regularly audit and update all self-hosted applications to ensure timely patching of vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-14T16:08:37.484Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696a8fc2b22c7ad868d78294

Added to database: 1/16/2026, 7:21:38 PM

Last enriched: 1/23/2026, 8:35:13 PM

Last updated: 2/7/2026, 9:33:47 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats