Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30869: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in siyuan-note siyuan

0
Critical
VulnerabilityCVE-2026-30869cvecve-2026-30869cwe-22
Published: Mon Mar 09 2026 (03/09/2026, 22:28:06 UTC)
Source: CVE Database V5
Vendor/Project: siyuan-note
Product: siyuan

Description

CVE-2026-30869 is a critical path traversal vulnerability in SiYuan personal knowledge management system versions prior to 3. 5. 10. It exists in the /export endpoint and allows attackers to read arbitrary files on the server by exploiting double-encoded traversal sequences. Sensitive files such as conf/conf. json containing API tokens, cookie signing keys, and workspace authentication codes can be accessed. Exposure of these secrets may grant administrative access to the SiYuan kernel API and could be chained to remote code execution in some deployments. The vulnerability has a CVSS score of 9. 3, indicating high severity with network attack vector and no authentication required. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 03/09/2026, 23:03:35 UTC

Technical Analysis

CVE-2026-30869 is a path traversal vulnerability categorized under CWE-22 affecting the SiYuan knowledge management system before version 3.5.10. The flaw resides in the /export endpoint, where insufficient validation of pathname inputs allows attackers to use double-encoded traversal sequences (e.g., %252e%252e/) to bypass directory restrictions and access arbitrary files on the server filesystem. This improper limitation of pathname enables reading of sensitive configuration files such as conf/conf.json, which contains critical secrets including API tokens, cookie signing keys, and workspace access authentication codes. These secrets can be leveraged to gain administrative privileges over the SiYuan kernel API, potentially allowing attackers to manipulate or extract data. In certain deployment environments, this initial access could be chained with other vulnerabilities or misconfigurations to achieve remote code execution (RCE), escalating the threat impact. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The issue was addressed and fixed in SiYuan version 3.5.10 by properly sanitizing and validating input paths to prevent traversal attacks. Although no active exploits have been reported, the critical nature of the vulnerability and the sensitivity of exposed data make it a significant threat to affected users.

Potential Impact

The impact of CVE-2026-30869 is substantial for organizations using vulnerable versions of SiYuan. Unauthorized reading of arbitrary files can lead to exposure of sensitive secrets such as API tokens and authentication keys, compromising confidentiality and enabling unauthorized administrative access. This can result in data breaches, unauthorized data manipulation, and loss of trust in the system. In environments where SiYuan is integrated with other services or contains sensitive organizational knowledge, the risk escalates. Furthermore, the potential to chain this vulnerability into remote code execution could allow attackers to execute arbitrary commands on the server, leading to full system compromise, data destruction, or lateral movement within the network. The vulnerability’s ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in exposed or internet-facing deployments. Organizations relying on SiYuan for critical knowledge management must consider this a high-priority risk.

Mitigation Recommendations

To mitigate CVE-2026-30869, organizations should immediately upgrade all SiYuan installations to version 3.5.10 or later, where the vulnerability has been patched. Additionally, administrators should audit access controls and restrict exposure of the /export endpoint to trusted networks or VPNs to reduce attack surface. Implementing web application firewalls (WAFs) with rules to detect and block double-encoded traversal sequences can provide an additional layer of defense. Regularly review and rotate sensitive credentials stored in configuration files to limit the impact of any potential leaks. Employ monitoring and alerting for unusual access patterns or attempts to access sensitive files. In deployments where SiYuan is integrated with other systems, conduct thorough security assessments to identify and remediate any chained vulnerabilities that could lead to RCE. Finally, maintain an incident response plan to quickly address any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-06T00:04:56.697Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69af4e6aea502d3aa8cf7cc9

Added to database: 3/9/2026, 10:49:14 PM

Last enriched: 3/9/2026, 11:03:35 PM

Last updated: 3/10/2026, 4:16:49 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses