Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23852: CWE-94: Improper Control of Generation of Code ('Code Injection') in siyuan-note siyuan

0
Medium
VulnerabilityCVE-2026-23852cvecve-2026-23852cwe-94
Published: Mon Jan 19 2026 (01/19/2026, 20:00:05 UTC)
Source: CVE Database V5
Vendor/Project: siyuan-note
Product: siyuan

Description

CVE-2026-23852 is a medium severity stored Cross-Site Scripting (XSS) vulnerability in SiYuan personal knowledge management system versions prior to 3. 5. 4. It allows attackers to inject arbitrary HTML attributes into the `icon` attribute of a block via the `/api/attr/setBlockAttrs` API. The injected payload is rendered unsanitized in the dynamic icon feature, leading to stored XSS and, in the desktop environment, potential remote code execution (RCE). This vulnerability bypasses a previous fix for a similar issue. No known exploits are reported in the wild yet. The vulnerability has a CVSS 4. 0 base score of 5. 8, reflecting medium severity.

AI-Powered Analysis

AILast updated: 01/19/2026, 20:35:34 UTC

Technical Analysis

CVE-2026-23852 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-94 (Improper Control of Generation of Code, i.e., code injection) affecting the SiYuan personal knowledge management system. The vulnerability exists in versions prior to 3.5.4 and arises from insufficient sanitization of user-supplied input in the `icon` attribute of blocks. Attackers can exploit the `/api/attr/setBlockAttrs` API endpoint to inject arbitrary HTML attributes into the icon attribute. When the dynamic icon feature renders this attribute, it does so in an unsanitized context, allowing the stored XSS payload to execute in the victim's environment. In the desktop application environment, this XSS can escalate to remote code execution (RCE), enabling an attacker to execute arbitrary code on the victim's machine. This vulnerability bypasses a previous fix (issue #15970) that attempted to address a similar XSS to RCE vector via dynamic icons, indicating incomplete remediation. The vulnerability is remotely exploitable without authentication and requires user interaction (e.g., viewing the affected block). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, and high scope impact on confidentiality, integrity, and availability. No public exploits are known at this time, but the potential for RCE in desktop environments elevates the risk. The vendor released version 3.5.4 containing an updated fix that properly sanitizes the icon attribute input to prevent injection.

Potential Impact

For European organizations using SiYuan versions prior to 3.5.4, this vulnerability poses a significant risk, especially in environments where the desktop application is used. Successful exploitation can lead to stored XSS attacks that compromise user sessions, steal sensitive data, or perform actions on behalf of the user. More critically, in desktop environments, the vulnerability can escalate to remote code execution, allowing attackers to execute arbitrary code, potentially leading to full system compromise. This can result in data breaches, intellectual property theft, disruption of business operations, and lateral movement within networks. Given that SiYuan is a personal knowledge management system, the confidentiality and integrity of organizational knowledge bases are at risk. The medium CVSS score reflects the moderate ease of exploitation combined with the serious impact of RCE. Although no known exploits are currently reported, the presence of a bypass of a previous fix suggests attackers may develop exploits. European organizations with knowledge workers relying on SiYuan desktop clients should consider this a priority vulnerability to address to avoid compromise and data loss.

Mitigation Recommendations

1. Immediate upgrade to SiYuan version 3.5.4 or later, which contains the updated fix for this vulnerability, is the most effective mitigation. 2. Until upgrade is possible, restrict access to the `/api/attr/setBlockAttrs` API endpoint to trusted users and networks only, using network segmentation and access control lists. 3. Implement Content Security Policy (CSP) headers in web environments hosting SiYuan to reduce the impact of XSS payloads. 4. Educate users to avoid opening untrusted or suspicious SiYuan blocks or documents, especially those containing dynamic icons. 5. Monitor application logs and network traffic for unusual API calls or injection attempts targeting the icon attribute. 6. Employ endpoint protection solutions capable of detecting and blocking suspicious code execution on desktop clients. 7. Conduct internal audits to identify and remediate any existing injected payloads in stored blocks. 8. Coordinate with SiYuan support or vendor channels for any additional patches or security advisories. These steps go beyond generic advice by focusing on API access control, user awareness specific to dynamic icons, and proactive detection of injection attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-16T15:46:40.843Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e92284623b1157ccc1f42

Added to database: 1/19/2026, 8:20:56 PM

Last enriched: 1/19/2026, 8:35:34 PM

Last updated: 1/19/2026, 9:59:12 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats