Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23851: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in siyuan-note siyuan

0
High
VulnerabilityCVE-2026-23851cvecve-2026-23851cwe-22
Published: Mon Jan 19 2026 (01/19/2026, 19:57:29 UTC)
Source: CVE Database V5
Vendor/Project: siyuan-note
Product: siyuan

Description

CVE-2026-23851 is a high-severity path traversal vulnerability in SiYuan Note versions prior to 3. 5. 4. It affects the /api/file/globalCopyFiles endpoint, allowing authenticated users to copy arbitrary files from anywhere on the server into the application's workspace due to insufficient path validation. The vulnerability arises because the code verifies file existence but does not restrict source paths to authorized directories. Exploitation requires authentication but no user interaction and can lead to unauthorized file access and potential data leakage or manipulation. The issue is patched in version 3. 5. 4. European organizations using affected SiYuan versions should prioritize upgrading to mitigate risks.

AI-Powered Analysis

AILast updated: 01/27/2026, 20:23:52 UTC

Technical Analysis

CVE-2026-23851 is a path traversal vulnerability classified under CWE-22, found in the SiYuan Note personal knowledge management system prior to version 3.5.4. The flaw exists in the /api/file/globalCopyFiles endpoint, specifically in the api/file.go source code. This function accepts a JSON request body containing a list of source file paths (srcs) that an authenticated user wants to copy into the application's workspace. While the code checks if each source file exists using filelock.IsExist(src), it fails to validate whether these source paths are confined within the authorized workspace directory. This lack of proper path validation allows an authenticated user to specify arbitrary paths outside the workspace, enabling them to copy any file from the server's filesystem into the workspace. This can lead to unauthorized access to sensitive files, potential data leakage, or manipulation of files within the workspace. The vulnerability does not require user interaction but does require the attacker to have authenticated access to the SiYuan application. The vulnerability has a CVSS v4.0 score of 8.3, indicating high severity, with network attack vector, low attack complexity, no privileges required beyond authentication, no user interaction, and high impact on confidentiality. The vulnerability was publicly disclosed on January 19, 2026, and patched in version 3.5.4 of SiYuan. No known exploits have been reported in the wild to date.

Potential Impact

For European organizations using SiYuan Note versions prior to 3.5.4, this vulnerability poses a significant risk of unauthorized file access and data leakage. Attackers with valid credentials could exploit this flaw to copy sensitive files from the server's filesystem into the application's workspace, potentially exposing confidential information or intellectual property. This could lead to breaches of data protection regulations such as GDPR if personal or sensitive data is accessed or exfiltrated. Additionally, the integrity of the knowledge management system could be compromised by injecting or manipulating files within the workspace, disrupting business operations or causing misinformation. Since the vulnerability requires authentication, insider threats or compromised credentials increase the risk. The high CVSS score reflects the potential for serious confidentiality and integrity impacts, although availability is not directly affected. Organizations relying on SiYuan for critical knowledge management should consider this vulnerability a priority for remediation to prevent potential exploitation and compliance violations.

Mitigation Recommendations

European organizations should immediately upgrade SiYuan Note installations to version 3.5.4 or later, where this vulnerability is patched. Until the upgrade is applied, restrict access to the /api/file/globalCopyFiles endpoint by implementing strict access controls and monitoring authenticated user activities for unusual file copy requests. Employ network segmentation to limit exposure of SiYuan servers to trusted users only. Conduct regular audits of user accounts and credentials to minimize risks from compromised or malicious insiders. Implement file integrity monitoring within the workspace directory to detect unauthorized file additions or changes. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious path traversal patterns in API requests. Finally, educate users on the importance of credential security and monitor logs for signs of exploitation attempts. These targeted measures will reduce the attack surface and help detect or prevent exploitation beyond generic patching advice.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-16T15:46:40.843Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e8ea44623b1157ccb6c5c

Added to database: 1/19/2026, 8:05:56 PM

Last enriched: 1/27/2026, 8:23:52 PM

Last updated: 2/7/2026, 4:56:59 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats