Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32751: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in siyuan-note siyuan

0
Medium
VulnerabilityCVE-2026-32751cvecve-2026-32751cwe-79
Published: Thu Mar 19 2026 (03/19/2026, 21:11:59 UTC)
Source: CVE Database V5
Vendor/Project: siyuan-note
Product: siyuan

Description

CVE-2026-32751 is a stored cross-site scripting (XSS) vulnerability in SiYuan personal knowledge management system versions 3. 6. 0 and below. It arises because the mobile file tree component renders notebook names using innerHTML without proper HTML escaping when processing renamenotebook WebSocket events. An authenticated user with permission to rename notebooks can inject malicious HTML/JavaScript that executes on any mobile client viewing the file tree. Due to Electron's configuration with nodeIntegration enabled and contextIsolation disabled, this XSS can escalate to full remote code execution on both mobile and desktop clients using the mobile layout. The vulnerability is fixed in version 3. 6. 1. The CVSS 4.

AI-Powered Analysis

AILast updated: 03/20/2026, 01:54:17 UTC

Technical Analysis

CVE-2026-32751 is a stored cross-site scripting vulnerability affecting SiYuan, a personal knowledge management system, in versions prior to 3.6.1. The issue resides in the mobile file tree component (MobileFiles.ts), which renders notebook names via innerHTML without applying HTML escaping when handling renamenotebook WebSocket events. This contrasts with the desktop component (Files.ts), which correctly escapes HTML. An authenticated user capable of renaming notebooks can inject arbitrary HTML or JavaScript code that will execute in the context of any mobile client viewing the file tree. Since SiYuan's Electron desktop app uses the same mobile layout when the window is narrow, the vulnerability also affects desktop users. Critically, Electron is configured with nodeIntegration set to true and contextIsolation set to false, allowing injected scripts to access Node.js APIs directly. This configuration escalates the stored XSS into a full remote code execution vulnerability, enabling attackers to execute arbitrary code on the victim's device. The vulnerability does not require user interaction beyond viewing the file tree and does not require elevated privileges beyond authenticated notebook renaming rights. The issue was addressed in version 3.6.1 by properly escaping HTML in the mobile file tree rendering. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N) reflects network attack vector, low attack complexity, no privileges required beyond authenticated renaming, and partial impact on confidentiality and integrity. No known exploits have been reported in the wild as of the publication date.

Potential Impact

This vulnerability poses a significant risk to organizations and individual users employing SiYuan for knowledge management, especially those using the mobile app or the Electron desktop app in narrow window mode. An attacker with authenticated access to rename notebooks can inject malicious scripts that execute with full Node.js privileges due to Electron's insecure configuration. This can lead to complete compromise of the victim's device, including data theft, installation of malware, or lateral movement within a network. The impact extends beyond confidentiality and integrity to full system control, elevating the severity beyond typical XSS attacks. Organizations relying on SiYuan for sensitive information management may face data breaches, operational disruption, and potential compliance violations. The requirement for authenticated access limits exposure but insider threats or compromised accounts can exploit this vulnerability. The lack of user interaction beyond viewing the file tree increases the risk of widespread exploitation within affected environments. Although no exploits are currently known in the wild, the ease of exploitation and severity of impact warrant urgent remediation.

Mitigation Recommendations

To mitigate this vulnerability, affected users and organizations should upgrade SiYuan to version 3.6.1 or later, where the issue is fixed by proper HTML escaping in the mobile file tree component. Until upgrading is possible, administrators should restrict notebook renaming permissions to trusted users only, minimizing the risk of malicious input. Additionally, consider disabling or restricting the use of the mobile layout in the Electron desktop app to reduce exposure. Electron's configuration should be hardened by disabling nodeIntegration and enabling contextIsolation to prevent JavaScript injection from escalating to remote code execution. Implement network segmentation and monitoring to detect suspicious WebSocket activity related to renamenotebook events. Educate users to avoid opening or interacting with suspicious notebooks and monitor logs for anomalous renaming actions. Regularly audit user permissions and enforce strong authentication to reduce the risk of account compromise. Finally, apply defense-in-depth controls such as endpoint protection and application whitelisting to limit the impact of potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T18:53:03.532Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bca5a4e32a4fbe5f143352

Added to database: 3/20/2026, 1:40:52 AM

Last enriched: 3/20/2026, 1:54:17 AM

Last updated: 3/20/2026, 2:42:11 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses