Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32750: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in siyuan-note siyuan

0
Medium
VulnerabilityCVE-2026-32750cvecve-2026-32750cwe-22cwe-552
Published: Thu Mar 19 2026 (03/19/2026, 21:15:32 UTC)
Source: CVE Database V5
Vendor/Project: siyuan-note
Product: siyuan

Description

SiYuan is a personal knowledge management system. In versions 3.6.0 and below, POST /api/import/importStdMd passes the localPath parameter directly to model.ImportFromLocalPath with zero path validation. The function recursively reads every file under the given path and permanently stores their content as SiYuan note documents in the workspace database, making them searchable and accessible to all workspace users. Data persists in the workspace database across restarts and is accessible to Publish Service Reader accounts. Combined with the renderSprig SQL injection ( separate advisory ), a non-admin user can then read all imported secrets without any additional privileges. This issue has been fixed in version 3.6.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:48:24 UTC

Technical Analysis

CVE-2026-32750 is a path traversal vulnerability identified in the SiYuan note-taking and knowledge management system, specifically affecting versions prior to 3.6.1. The issue arises from the POST /api/import/importStdMd API endpoint, which accepts a localPath parameter that is directly passed to the internal function model.ImportFromLocalPath without any path validation or sanitization. This lack of validation enables an attacker with at least some level of authenticated access (high privileges required) to specify arbitrary filesystem paths. The ImportFromLocalPath function recursively reads all files under the specified path and imports their contents into the SiYuan workspace database as note documents. These imported documents are then searchable and accessible to all users within the workspace, including those with Publish Service Reader roles, which typically have read-only access. Because the data persists across restarts, sensitive files such as configuration files, credentials, or other secrets stored on the host can be exfiltrated indirectly through the application interface. Furthermore, when combined with a separate renderSprig SQL injection vulnerability, a non-admin user can escalate their ability to read all imported secrets without further privileges. The vulnerability does not affect data integrity or availability but poses a significant confidentiality risk. The issue was addressed and fixed in SiYuan version 3.6.1 by implementing proper path validation and restricting unauthorized file imports. The CVSS v3.1 base score is 6.8, reflecting network attack vector, low attack complexity, required privileges, no user interaction, and a scope change due to data exposure beyond the initial component.

Potential Impact

This vulnerability allows attackers with authenticated access to read arbitrary files on the host system by importing them into the SiYuan workspace database. The confidentiality of sensitive data such as credentials, configuration files, or proprietary documents can be compromised. Because imported data is accessible to all workspace users, including read-only roles, the attack surface extends beyond the initial privileged user. The persistence of data across restarts increases the window for data exfiltration. Combined with the renderSprig SQL injection vulnerability, even non-admin users can exploit this flaw to access sensitive information, significantly increasing the risk of insider threats or lateral movement within organizations. Organizations using SiYuan for knowledge management may face data leakage, intellectual property theft, or exposure of secrets that could facilitate further attacks. The vulnerability does not impact system integrity or availability directly but undermines trust in the confidentiality of the knowledge management system.

Mitigation Recommendations

Upgrade SiYuan to version 3.6.1 or later, where this vulnerability is fixed with proper path validation. Until upgrading, restrict access to the /api/import/importStdMd endpoint to trusted administrators only, minimizing the number of users who can invoke the import functionality. Implement strict access controls and monitoring on workspace user roles, especially limiting Publish Service Reader accounts to only necessary users. Employ network segmentation and firewall rules to restrict access to the SiYuan service from untrusted networks. Conduct regular audits of imported documents in the workspace database to detect any suspicious or unexpected content. Additionally, review and patch the related renderSprig SQL injection vulnerability to prevent combined exploitation. Consider deploying application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block path traversal attempts. Finally, educate users about the risks of importing files from untrusted paths and enforce secure operational procedures.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T18:53:03.531Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bca5a4e32a4fbe5f143348

Added to database: 3/20/2026, 1:40:52 AM

Last enriched: 3/27/2026, 6:48:24 PM

Last updated: 5/3/2026, 3:14:02 PM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses