Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32815: CWE-287: Improper Authentication in siyuan-note siyuan

0
Medium
VulnerabilityCVE-2026-32815cvecve-2026-32815cwe-287
Published: Thu Mar 19 2026 (03/19/2026, 21:39:31 UTC)
Source: CVE Database V5
Vendor/Project: siyuan-note
Product: siyuan

Description

CVE-2026-32815 is an improper authentication vulnerability in SiYuan note-taking software versions 3. 6. 0 and below. The WebSocket endpoint (/ws) allows unauthenticated connections when specific URL parameters are used, enabling external clients, including malicious websites, to connect and receive real-time server push events. This leads to leakage of sensitive metadata such as document titles, notebook names, file paths, and CRUD operations performed by authenticated users. The absence of Origin header validation allows cross-origin WebSocket connections, enabling silent monitoring of a victim's local SiYuan instance by malicious websites. The vulnerability has been fixed in version 3. 6. 1. It has a CVSS 4.

AI-Powered Analysis

AILast updated: 03/19/2026, 22:09:29 UTC

Technical Analysis

SiYuan is a personal knowledge management system that, in versions 3.6.0 and below, contains a critical design flaw in its WebSocket endpoint (/ws). This endpoint accepts unauthenticated WebSocket connections if the URL parameters ?app=siyuan&id=auth&type=auth are present. This behavior was intended to keep the kernel alive on the login page but inadvertently allows any external client, including malicious websites, to establish a WebSocket connection without authentication. Due to the lack of Origin header validation, cross-origin WebSocket connections are permitted, enabling attackers to bypass same-origin policies. Once connected, the attacker receives all server push events in real-time, which include sensitive document metadata such as document titles, notebook names, file paths, and all CRUD (Create, Read, Update, Delete) operations performed by authenticated users. This leakage compromises confidentiality and user privacy by exposing internal note-taking activities. The vulnerability is classified under CWE-287 (Improper Authentication) and was assigned CVE-2026-32815. It has a CVSS 4.0 base score of 5.3, indicating medium severity. The issue was addressed and fixed in SiYuan version 3.6.1 by presumably enforcing proper authentication and Origin header validation on the WebSocket endpoint.

Potential Impact

The vulnerability allows attackers to bypass authentication and silently monitor a victim's note-taking activities in real-time. This compromises the confidentiality of sensitive information such as document titles, notebook names, file paths, and user operations, potentially exposing intellectual property, personal data, or business secrets. Organizations using SiYuan for knowledge management risk data leakage without any direct compromise of the host system. Since the attack can be triggered via a malicious website through cross-origin WebSocket connections, users can be targeted through phishing or drive-by attacks. The integrity and availability of the system are not directly impacted, but the privacy breach can lead to reputational damage, loss of trust, and potential regulatory compliance issues. The vulnerability affects all users running SiYuan versions below 3.6.1, especially those who access the software in environments where malicious web content can be encountered.

Mitigation Recommendations

Upgrade SiYuan to version 3.6.1 or later, where this vulnerability is fixed. If immediate upgrade is not possible, restrict access to the WebSocket endpoint by implementing network-level controls such as firewall rules that block external access to the local SiYuan instance, especially from untrusted networks. Disable or limit WebSocket connections from untrusted origins by configuring reverse proxies or web application firewalls to enforce Origin header validation. Educate users to avoid visiting untrusted or suspicious websites while running vulnerable versions of SiYuan. Consider running SiYuan in isolated environments or containers with strict network policies to limit exposure. Monitor network traffic for unusual WebSocket connections to the /ws endpoint. Finally, vendors should consider adding authentication and strict origin checks to all WebSocket endpoints to prevent similar issues in future releases.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-16T17:35:36.696Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bc708fe32a4fbe5ffd51b0

Added to database: 3/19/2026, 9:54:23 PM

Last enriched: 3/19/2026, 10:09:29 PM

Last updated: 3/20/2026, 12:08:57 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses