Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23852: CWE-94: Improper Control of Generation of Code ('Code Injection') in siyuan-note siyuan

0
Medium
VulnerabilityCVE-2026-23852cvecve-2026-23852cwe-94
Published: Mon Jan 19 2026 (01/19/2026, 20:00:05 UTC)
Source: CVE Database V5
Vendor/Project: siyuan-note
Product: siyuan

Description

CVE-2026-23852 is a medium severity stored Cross-Site Scripting (XSS) vulnerability in SiYuan Note versions prior to 3. 5. 4. It allows attackers to inject arbitrary HTML attributes into the 'icon' attribute of a block via the /api/attr/setBlockAttrs API. The injected payload is rendered unsanitized in the dynamic icon feature, leading to stored XSS and, in the desktop environment, potential remote code execution (RCE). This vulnerability bypasses a previous fix and affects personal knowledge management systems using vulnerable SiYuan versions. No known exploits are currently reported in the wild. The vulnerability has a CVSS 4. 0 score of 5. 8, indicating medium severity.

AI-Powered Analysis

AILast updated: 01/27/2026, 20:24:05 UTC

Technical Analysis

CVE-2026-23852 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-94 (Improper Control of Generation of Code) affecting SiYuan Note, a personal knowledge management system. Versions prior to 3.5.4 allow an attacker to inject arbitrary HTML attributes into the 'icon' attribute of a block via the /api/attr/setBlockAttrs API endpoint. The vulnerability arises because the dynamic icon feature renders these attributes in an unsanitized context, enabling stored XSS attacks. In the desktop environment, this stored XSS can escalate to remote code execution (RCE), posing a significant risk. This vulnerability bypasses a previous fix (issue #15970) that attempted to address XSS leading to RCE via dynamic icons, indicating incomplete sanitization or validation in the codebase. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, but with high scope and impact on integrity and availability. No known exploits have been reported in the wild as of publication. The vendor released version 3.5.4 containing an updated fix that properly sanitizes the input to prevent code injection. The vulnerability highlights the risks of insufficient input validation and output encoding in web applications that support dynamic content rendering, especially in desktop environments where XSS can lead to RCE.

Potential Impact

For European organizations using SiYuan Note versions prior to 3.5.4, this vulnerability could lead to unauthorized code execution on affected systems, especially in desktop environments. Confidentiality could be compromised if attackers inject scripts that steal sensitive data or credentials. Integrity and availability may also be impacted if attackers execute malicious code that alters or deletes data or disrupts service. Since SiYuan is a personal knowledge management system, organizations relying on it for sensitive or proprietary information risk data leakage or sabotage. The vulnerability's ability to bypass previous fixes suggests attackers could exploit it to gain persistent access or escalate privileges. Although no known exploits exist currently, the medium severity and ease of exploitation (no authentication or user interaction required) mean that targeted attacks or automated scanning could emerge. European organizations with remote or hybrid workforces using vulnerable SiYuan desktop clients are particularly at risk. The impact extends to intellectual property theft, operational disruption, and potential compliance violations under GDPR if personal data is exposed.

Mitigation Recommendations

European organizations should immediately update all SiYuan Note installations to version 3.5.4 or later, which contains the updated fix for this vulnerability. Until updates are applied, restrict access to the /api/attr/setBlockAttrs API endpoint via network controls or application-layer firewalls to trusted users only. Implement strict input validation and output encoding on any custom integrations or plugins interacting with SiYuan to prevent injection of malicious attributes. Monitor logs for unusual API requests or unexpected changes to block attributes that could indicate exploitation attempts. Educate users about the risks of opening untrusted SiYuan files or links that could trigger malicious payloads. Employ endpoint protection solutions capable of detecting suspicious script execution in desktop environments. Conduct regular vulnerability scans and penetration tests focusing on web application and desktop client attack surfaces. Finally, maintain an incident response plan to quickly contain and remediate any detected exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-16T15:46:40.843Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e92284623b1157ccc1f42

Added to database: 1/19/2026, 8:20:56 PM

Last enriched: 1/27/2026, 8:24:05 PM

Last updated: 2/7/2026, 8:00:54 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats