Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25647: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in siyuan-note siyuan

0
Medium
VulnerabilityCVE-2026-25647cvecve-2026-25647cwe-79
Published: Fri Feb 06 2026 (02/06/2026, 19:03:36 UTC)
Source: CVE Database V5
Vendor/Project: siyuan-note
Product: siyuan

Description

CVE-2026-25647 is a stored Cross-Site Scripting (XSS) vulnerability in the Lute Markdown rendering engine used by the SiYuan note-taking application versions prior to 3. 5. 5. An attacker can inject malicious JavaScript code into Markdown notes, which executes in the context of other users' sessions when they view the rendered content. This vulnerability requires an attacker with at least limited privileges to create or modify notes and user interaction to trigger the exploit. The CVSS score is 4. 6 (medium severity), reflecting limited confidentiality and integrity impact without availability effects. No known exploits are currently reported in the wild. European organizations using SiYuan note versions earlier than 3. 5.

AI-Powered Analysis

AILast updated: 02/06/2026, 19:31:08 UTC

Technical Analysis

CVE-2026-25647 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Lute Markdown engine, which is integrated into the SiYuan note-taking application. Lute versions 1.7.6 and earlier, as used in SiYuan versions prior to 3.5.5, improperly neutralize input during web page generation, allowing malicious JavaScript code to be embedded within Markdown notes. When a user views the rendered note, the injected script executes within their browser session, potentially compromising session confidentiality and integrity. This vulnerability falls under CWE-79, indicating improper input sanitization. Exploitation requires an attacker to have at least limited privileges to create or edit notes and relies on user interaction to trigger the malicious payload. The CVSS 3.1 base score of 4.6 reflects network attack vector, low attack complexity, low privileges required, and user interaction necessary, with limited confidentiality and integrity impact but no availability impact. No public exploits are currently known, but the vulnerability poses a risk in collaborative environments where untrusted users can contribute content. The lack of a patch link suggests that users must upgrade to SiYuan 3.5.5 or later, where the vulnerability is presumably fixed. Organizations using SiYuan for note-taking and knowledge management should assess their exposure and remediate accordingly.

Potential Impact

For European organizations, this vulnerability can lead to session hijacking, theft of sensitive information, or unauthorized actions performed in the context of a victim's session if exploited. The impact is particularly relevant for organizations that use SiYuan as a collaborative knowledge management or note-taking tool, especially in sectors like education, research, and enterprise knowledge bases. Attackers could leverage this vulnerability to escalate privileges, exfiltrate confidential data, or spread malware within an organization. While the vulnerability does not affect system availability, the compromise of confidentiality and integrity can lead to reputational damage, regulatory non-compliance (e.g., GDPR), and operational disruptions. The requirement for user interaction and limited privileges reduces the risk somewhat but does not eliminate it, especially in environments with many users and frequent content sharing. Organizations with remote or hybrid workforces relying on such tools are at increased risk due to diverse user access patterns.

Mitigation Recommendations

1. Upgrade SiYuan to version 3.5.5 or later immediately to ensure the vulnerability is patched. 2. Implement strict input validation and sanitization on all Markdown content inputs to prevent script injection. 3. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the application context. 4. Educate users about the risks of clicking on untrusted or unexpected links and rendered content within SiYuan notes. 5. Monitor logs for unusual activity related to note creation or modification, especially from users with limited privileges. 6. Consider restricting note creation or editing permissions to trusted users only, reducing the attack surface. 7. Regularly audit and review third-party components like Lute for vulnerabilities and apply updates promptly. 8. Employ web application firewalls (WAFs) with rules to detect and block XSS payloads targeting SiYuan endpoints.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-04T05:15:41.792Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69863dc0f9fa50a62f292942

Added to database: 2/6/2026, 7:15:12 PM

Last enriched: 2/6/2026, 7:31:08 PM

Last updated: 2/7/2026, 3:22:20 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats