CVE-2026-23852: CWE-94: Improper Control of Generation of Code ('Code Injection') in siyuan-note siyuan
CVE-2026-23852 is a medium severity stored Cross-Site Scripting (XSS) vulnerability in SiYuan personal knowledge management system versions prior to 3. 5. 4. It allows attackers to inject arbitrary HTML attributes into the `icon` attribute of a block via the `/api/attr/setBlockAttrs` API. The injected payload is rendered unsanitized in the dynamic icon feature, leading to stored XSS and, in the desktop environment, potential remote code execution (RCE). This vulnerability bypasses a previous fix for a similar issue. No known exploits are reported in the wild yet. The vulnerability has a CVSS 4. 0 base score of 5. 8, reflecting medium severity.
AI Analysis
Technical Summary
CVE-2026-23852 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-94 (Improper Control of Generation of Code, i.e., code injection) affecting the SiYuan personal knowledge management system. The vulnerability exists in versions prior to 3.5.4 and arises from insufficient sanitization of user-supplied input in the `icon` attribute of blocks. Attackers can exploit the `/api/attr/setBlockAttrs` API endpoint to inject arbitrary HTML attributes into the icon attribute. When the dynamic icon feature renders this attribute, it does so in an unsanitized context, allowing the stored XSS payload to execute in the victim's environment. In the desktop application environment, this XSS can escalate to remote code execution (RCE), enabling an attacker to execute arbitrary code on the victim's machine. This vulnerability bypasses a previous fix (issue #15970) that attempted to address a similar XSS to RCE vector via dynamic icons, indicating incomplete remediation. The vulnerability is remotely exploitable without authentication and requires user interaction (e.g., viewing the affected block). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, and high scope impact on confidentiality, integrity, and availability. No public exploits are known at this time, but the potential for RCE in desktop environments elevates the risk. The vendor released version 3.5.4 containing an updated fix that properly sanitizes the icon attribute input to prevent injection.
Potential Impact
For European organizations using SiYuan versions prior to 3.5.4, this vulnerability poses a significant risk, especially in environments where the desktop application is used. Successful exploitation can lead to stored XSS attacks that compromise user sessions, steal sensitive data, or perform actions on behalf of the user. More critically, in desktop environments, the vulnerability can escalate to remote code execution, allowing attackers to execute arbitrary code, potentially leading to full system compromise. This can result in data breaches, intellectual property theft, disruption of business operations, and lateral movement within networks. Given that SiYuan is a personal knowledge management system, the confidentiality and integrity of organizational knowledge bases are at risk. The medium CVSS score reflects the moderate ease of exploitation combined with the serious impact of RCE. Although no known exploits are currently reported, the presence of a bypass of a previous fix suggests attackers may develop exploits. European organizations with knowledge workers relying on SiYuan desktop clients should consider this a priority vulnerability to address to avoid compromise and data loss.
Mitigation Recommendations
1. Immediate upgrade to SiYuan version 3.5.4 or later, which contains the updated fix for this vulnerability, is the most effective mitigation. 2. Until upgrade is possible, restrict access to the `/api/attr/setBlockAttrs` API endpoint to trusted users and networks only, using network segmentation and access control lists. 3. Implement Content Security Policy (CSP) headers in web environments hosting SiYuan to reduce the impact of XSS payloads. 4. Educate users to avoid opening untrusted or suspicious SiYuan blocks or documents, especially those containing dynamic icons. 5. Monitor application logs and network traffic for unusual API calls or injection attempts targeting the icon attribute. 6. Employ endpoint protection solutions capable of detecting and blocking suspicious code execution on desktop clients. 7. Conduct internal audits to identify and remediate any existing injected payloads in stored blocks. 8. Coordinate with SiYuan support or vendor channels for any additional patches or security advisories. These steps go beyond generic advice by focusing on API access control, user awareness specific to dynamic icons, and proactive detection of injection attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain
CVE-2026-23852: CWE-94: Improper Control of Generation of Code ('Code Injection') in siyuan-note siyuan
Description
CVE-2026-23852 is a medium severity stored Cross-Site Scripting (XSS) vulnerability in SiYuan personal knowledge management system versions prior to 3. 5. 4. It allows attackers to inject arbitrary HTML attributes into the `icon` attribute of a block via the `/api/attr/setBlockAttrs` API. The injected payload is rendered unsanitized in the dynamic icon feature, leading to stored XSS and, in the desktop environment, potential remote code execution (RCE). This vulnerability bypasses a previous fix for a similar issue. No known exploits are reported in the wild yet. The vulnerability has a CVSS 4. 0 base score of 5. 8, reflecting medium severity.
AI-Powered Analysis
Technical Analysis
CVE-2026-23852 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-94 (Improper Control of Generation of Code, i.e., code injection) affecting the SiYuan personal knowledge management system. The vulnerability exists in versions prior to 3.5.4 and arises from insufficient sanitization of user-supplied input in the `icon` attribute of blocks. Attackers can exploit the `/api/attr/setBlockAttrs` API endpoint to inject arbitrary HTML attributes into the icon attribute. When the dynamic icon feature renders this attribute, it does so in an unsanitized context, allowing the stored XSS payload to execute in the victim's environment. In the desktop application environment, this XSS can escalate to remote code execution (RCE), enabling an attacker to execute arbitrary code on the victim's machine. This vulnerability bypasses a previous fix (issue #15970) that attempted to address a similar XSS to RCE vector via dynamic icons, indicating incomplete remediation. The vulnerability is remotely exploitable without authentication and requires user interaction (e.g., viewing the affected block). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, and high scope impact on confidentiality, integrity, and availability. No public exploits are known at this time, but the potential for RCE in desktop environments elevates the risk. The vendor released version 3.5.4 containing an updated fix that properly sanitizes the icon attribute input to prevent injection.
Potential Impact
For European organizations using SiYuan versions prior to 3.5.4, this vulnerability poses a significant risk, especially in environments where the desktop application is used. Successful exploitation can lead to stored XSS attacks that compromise user sessions, steal sensitive data, or perform actions on behalf of the user. More critically, in desktop environments, the vulnerability can escalate to remote code execution, allowing attackers to execute arbitrary code, potentially leading to full system compromise. This can result in data breaches, intellectual property theft, disruption of business operations, and lateral movement within networks. Given that SiYuan is a personal knowledge management system, the confidentiality and integrity of organizational knowledge bases are at risk. The medium CVSS score reflects the moderate ease of exploitation combined with the serious impact of RCE. Although no known exploits are currently reported, the presence of a bypass of a previous fix suggests attackers may develop exploits. European organizations with knowledge workers relying on SiYuan desktop clients should consider this a priority vulnerability to address to avoid compromise and data loss.
Mitigation Recommendations
1. Immediate upgrade to SiYuan version 3.5.4 or later, which contains the updated fix for this vulnerability, is the most effective mitigation. 2. Until upgrade is possible, restrict access to the `/api/attr/setBlockAttrs` API endpoint to trusted users and networks only, using network segmentation and access control lists. 3. Implement Content Security Policy (CSP) headers in web environments hosting SiYuan to reduce the impact of XSS payloads. 4. Educate users to avoid opening untrusted or suspicious SiYuan blocks or documents, especially those containing dynamic icons. 5. Monitor application logs and network traffic for unusual API calls or injection attempts targeting the icon attribute. 6. Employ endpoint protection solutions capable of detecting and blocking suspicious code execution on desktop clients. 7. Conduct internal audits to identify and remediate any existing injected payloads in stored blocks. 8. Coordinate with SiYuan support or vendor channels for any additional patches or security advisories. These steps go beyond generic advice by focusing on API access control, user awareness specific to dynamic icons, and proactive detection of injection attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-16T15:46:40.843Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696e92284623b1157ccc1f42
Added to database: 1/19/2026, 8:20:56 PM
Last enriched: 1/19/2026, 8:35:34 PM
Last updated: 1/19/2026, 9:59:12 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1177: SQL Injection in Yonyou KSOA
MediumCVE-2026-23944: CWE-306: Missing Authentication for Critical Function in getarcaneapp arcane
HighCVE-2026-23885: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in AlchemyCMS alchemy_cms
MediumCVE-2026-23880: CWE-20: Improper Input Validation in HackUCF OnboardLite
HighCVE-2026-23877: CWE-25: Path Traversal: '/../filedir' in swingmx swingmusic
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.