Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33203: CWE-248: Uncaught Exception in siyuan-note siyuan

0
High
VulnerabilityCVE-2026-33203cvecve-2026-33203cwe-248cwe-306
Published: Fri Mar 20 2026 (03/20/2026, 22:32:33 UTC)
Source: CVE Database V5
Vendor/Project: siyuan-note
Product: siyuan

Description

SiYuan is a personal knowledge management system. Prior to version 3.6.2, the SiYuan kernel WebSocket server accepts unauthenticated connections when a specific "auth keepalive" query parameter is present. After connection, incoming messages are parsed using unchecked type assertions on attacker-controlled JSON. A remote attacker can send malformed messages that trigger a runtime panic, potentially crashing the kernel process and causing denial of service. Version 3.6.2 fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 23:44:57 UTC

Technical Analysis

SiYuan is a personal knowledge management system that includes a kernel WebSocket server component. Versions prior to 3.6.2 contain a vulnerability (CVE-2026-33203) where the WebSocket server accepts unauthenticated connections if the client includes a specific 'auth keepalive' query parameter. Once connected, the server processes incoming JSON messages using unchecked type assertions, meaning it does not properly validate or sanitize the structure and types of the JSON data received. This lack of validation allows a remote attacker to craft malformed JSON messages that cause the server to encounter an uncaught exception, specifically a runtime panic. This panic crashes the kernel process, resulting in a denial of service (DoS) condition. The vulnerability is categorized under CWE-248 (Uncaught Exception) and CWE-306 (Missing Authentication for Critical Function). The CVSS v3.1 score is 7.5 (high), reflecting that the attack can be performed remotely without authentication or user interaction, and impacts availability but not confidentiality or integrity. The vulnerability was publicly disclosed on March 20, 2026, and fixed in version 3.6.2 of SiYuan. No known exploits are currently reported in the wild.

Potential Impact

The primary impact of CVE-2026-33203 is denial of service due to the kernel process crash. Organizations relying on SiYuan for knowledge management may experience service interruptions, loss of availability, and potential disruption of workflows. Since the vulnerability does not affect confidentiality or integrity, data theft or manipulation is not directly at risk. However, repeated exploitation could degrade system reliability and user trust. The ease of exploitation—no authentication or user interaction required—means attackers can remotely disrupt services at scale. This could be leveraged in targeted attacks against organizations or in broader denial of service campaigns. The impact is especially significant for environments where SiYuan is critical for daily operations or collaboration.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade SiYuan to version 3.6.2 or later, where the issue is fixed. If immediate upgrade is not possible, network-level controls should be implemented to restrict access to the WebSocket server, especially blocking unauthenticated connections that include the 'auth keepalive' query parameter. Deploy Web Application Firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block malformed JSON payloads or suspicious WebSocket traffic patterns. Monitor logs for abnormal connection attempts or crashes related to the WebSocket server. Additionally, implement robust input validation and error handling in custom deployments or forks of SiYuan to prevent uncaught exceptions. Regularly audit and update dependencies to reduce exposure to similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T23:23:58.312Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bdda59b462d409683a8cca

Added to database: 3/20/2026, 11:38:01 PM

Last enriched: 3/20/2026, 11:44:57 PM

Last updated: 3/21/2026, 12:01:38 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses