Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33194: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in siyuan-note siyuan

0
Medium
VulnerabilityCVE-2026-33194cvecve-2026-33194cwe-22
Published: Fri Mar 20 2026 (03/20/2026, 22:30:33 UTC)
Source: CVE Database V5
Vendor/Project: siyuan-note
Product: siyuan

Description

SiYuan is a personal knowledge management system. Prior to version 3.6.2, the `IsSensitivePath()` function in `kernel/util/path.go` uses a denylist approach that was recently expanded (GHSA-h5vh-m7fg-w5h6, commit 9914fd1) but remains incomplete. Multiple security-relevant Linux directories are not blocked, including `/opt` (application data), `/usr` (local configs/binaries), `/home` (other users), `/mnt` and `/media` (mounted volumes). The `globalCopyFiles` and `importStdMd` endpoints rely on `IsSensitivePath` as their primary defense against reading files outside the workspace. Version 3.6.2 contains an updated fix.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/28/2026, 21:12:09 UTC

Technical Analysis

CVE-2026-33194 is a path traversal vulnerability classified under CWE-22 affecting the SiYuan Note personal knowledge management system prior to version 3.6.2. The root cause lies in the IsSensitivePath() function within kernel/util/path.go, which employs a denylist approach to restrict access to sensitive filesystem paths. Although the denylist was recently expanded, it remains incomplete, failing to block access to several important Linux directories such as /opt (commonly used for application data), /usr (local binaries and configs), /home (user directories), /mnt, and /media (mounted volumes). The vulnerability specifically impacts the globalCopyFiles and importStdMd endpoints, which rely on IsSensitivePath() to prevent reading files outside the user's workspace. Because the denylist is incomplete, an attacker with high privileges and authentication can exploit this flaw to perform unauthorized file reads beyond the intended scope, potentially exposing sensitive system or user data. The vulnerability does not allow modification or deletion of files, nor does it affect system availability. The CVSS 3.1 score of 6.8 reflects a medium severity with network attack vector, low attack complexity, required privileges at a high level, no user interaction, and a scope change due to potential cross-component impact. The issue was fixed in SiYuan Note version 3.6.2 by enhancing the path restriction logic to cover previously unblocked directories. No known exploits are currently reported in the wild.

Potential Impact

The primary impact of CVE-2026-33194 is unauthorized disclosure of sensitive information due to improper path traversal protections. Attackers with authenticated high privileges can read files outside the intended workspace, potentially accessing configuration files, user data, application secrets, or mounted volumes that may contain sensitive information. This can lead to privacy violations, leakage of credentials or keys, and exposure of intellectual property. Although the vulnerability does not allow modification or deletion of files, the confidentiality breach alone can have serious consequences for organizations relying on SiYuan Note for knowledge management. The scope of affected systems is limited to those running vulnerable versions of SiYuan Note on Linux environments. Organizations with sensitive data stored or processed within SiYuan Note are at risk, especially if the application is used in multi-user or shared environments. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for targeted attacks. Overall, the vulnerability poses a moderate risk to confidentiality with no direct impact on integrity or availability.

Mitigation Recommendations

To mitigate CVE-2026-33194, organizations should upgrade SiYuan Note to version 3.6.2 or later, where the path traversal issue has been addressed with a more comprehensive denylist in the IsSensitivePath() function. Until upgrade is possible, restrict access to the globalCopyFiles and importStdMd endpoints to only fully trusted users and monitor usage for suspicious activity. Implement strict access controls and auditing on the underlying Linux filesystem to detect unauthorized file access attempts. Consider deploying application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block path traversal attempts. Review and harden user privilege assignments to minimize the number of users with high privileges required to exploit this vulnerability. Additionally, conduct regular security assessments and code reviews of custom plugins or extensions that interact with file paths to ensure they do not introduce similar weaknesses. Finally, educate users and administrators about the risks of path traversal and the importance of applying security patches promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T22:16:36.721Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bdda59b462d409683a8cc7

Added to database: 3/20/2026, 11:38:01 PM

Last enriched: 3/28/2026, 9:12:09 PM

Last updated: 5/2/2026, 9:14:06 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses