Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32747: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in siyuan-note siyuan

0
Medium
VulnerabilityCVE-2026-32747cvecve-2026-32747cwe-22cwe-184
Published: Thu Mar 19 2026 (03/19/2026, 21:02:16 UTC)
Source: CVE Database V5
Vendor/Project: siyuan-note
Product: siyuan

Description

CVE-2026-32747 is a path traversal vulnerability in SiYuan personal knowledge management system versions 3. 6. 0 and below. The globalCopyFiles API improperly validates file paths, allowing an admin user to copy sensitive files outside the intended workspace boundaries. This includes critical files such as /proc/1/environ and Docker secrets in containerized environments. Exploited files become accessible via the standard workspace file API and persist until manually removed. The vulnerability requires administrative privileges but no user interaction and has a CVSS score of 6. 8 (medium severity). It was fixed in version 3. 6.

AI-Powered Analysis

AILast updated: 03/19/2026, 21:40:29 UTC

Technical Analysis

CVE-2026-32747 is a path traversal vulnerability classified under CWE-22 and CWE-184 affecting SiYuan, a personal knowledge management system, in versions 3.6.0 and earlier. The vulnerability arises from the globalCopyFiles API, which uses filepath.Abs() to resolve file paths but fails to enforce strict workspace boundary checks. Instead, it relies on a blocklist implemented by util.IsSensitivePath(), which incompletely filters sensitive paths, omitting critical directories such as /proc/, /run/secrets/, and home directory dotfiles. An attacker with administrative privileges can exploit this flaw to copy arbitrary files from outside the workspace into it, including sensitive files like /proc/1/environ and Docker container secrets. Since containerized deployments commonly inject secrets and environment variables as files in these directories, this vulnerability enables exfiltration of credentials and sensitive data accessible to the SiYuan process. The copied files remain accessible through the standard workspace file API and persist until manually deleted, increasing the risk of data leakage. The vulnerability does not require user interaction but does require administrative privileges. It has a CVSS v3.1 base score of 6.8, reflecting a medium severity with high confidentiality impact but no integrity or availability impact. The issue was addressed in SiYuan version 3.6.1 by improving path validation and boundary enforcement.

Potential Impact

This vulnerability allows an attacker with administrative access to SiYuan to bypass intended file access restrictions and exfiltrate sensitive files from the host system or container environment. The confidentiality of critical data such as environment variables, Docker secrets, and system information can be compromised. In containerized environments, where secrets are often mounted as files, this can lead to leakage of credentials used for database access, cloud services, or other sensitive integrations. The persistence of exfiltrated files in the workspace increases the window of exposure and potential for further unauthorized access. While exploitation requires admin privileges, the impact on confidentiality is high, potentially enabling lateral movement or privilege escalation if secrets are reused elsewhere. Organizations relying on SiYuan for knowledge management, especially in DevOps or cloud-native deployments, face increased risk of sensitive data exposure and subsequent operational or reputational damage.

Mitigation Recommendations

The primary mitigation is to upgrade SiYuan to version 3.6.1 or later, where the vulnerability has been fixed by enforcing proper workspace boundary checks and improving path validation logic. Administrators should audit existing workspaces for any suspicious or unexpected files copied from outside the workspace and remove them. Implement strict access controls to limit administrative privileges to trusted personnel only, reducing the risk of exploitation. In containerized deployments, avoid mounting sensitive secrets in locations accessible by SiYuan or isolate SiYuan processes with minimal permissions. Employ runtime monitoring to detect unusual file access patterns or copying activities. Additionally, consider implementing file integrity monitoring on workspace directories to alert on unauthorized file additions. Regularly review and update blocklists or allowlists for sensitive paths to ensure comprehensive coverage. Finally, educate administrators about the risks of path traversal vulnerabilities and the importance of timely patching.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T18:53:03.531Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bc698ee32a4fbe5ffae09f

Added to database: 3/19/2026, 9:24:30 PM

Last enriched: 3/19/2026, 9:40:29 PM

Last updated: 3/19/2026, 10:51:54 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses