Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33203: CWE-248: Uncaught Exception in siyuan-note siyuan

0
High
VulnerabilityCVE-2026-33203cvecve-2026-33203cwe-248cwe-306
Published: Fri Mar 20 2026 (03/20/2026, 22:32:33 UTC)
Source: CVE Database V5
Vendor/Project: siyuan-note
Product: siyuan

Description

SiYuan is a personal knowledge management system. Prior to version 3.6.2, the SiYuan kernel WebSocket server accepts unauthenticated connections when a specific "auth keepalive" query parameter is present. After connection, incoming messages are parsed using unchecked type assertions on attacker-controlled JSON. A remote attacker can send malformed messages that trigger a runtime panic, potentially crashing the kernel process and causing denial of service. Version 3.6.2 fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/28/2026, 21:37:05 UTC

Technical Analysis

CVE-2026-33203 is a vulnerability in the SiYuan personal knowledge management system's kernel WebSocket server component, present in versions before 3.6.2. The flaw arises because the server accepts unauthenticated WebSocket connections when a particular "auth keepalive" query parameter is included in the connection request. Once connected, the server processes incoming JSON messages using unchecked type assertions, meaning it does not validate the structure or type of the JSON data before parsing. An attacker can exploit this by sending specially crafted malformed JSON messages that trigger a runtime panic in the Go-based server process. This panic causes the kernel process to crash, leading to a denial of service (DoS) condition. The vulnerability is classified under CWE-248 (Uncaught Exception) and CWE-306 (Missing Authentication for Critical Function). The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, no required privileges or user interaction, and a significant impact on availability. No known exploits are currently reported in the wild. The issue is resolved in SiYuan version 3.6.2 by presumably adding proper authentication checks and input validation to prevent unauthenticated connections and malformed message processing.

Potential Impact

The primary impact of this vulnerability is denial of service, as successful exploitation crashes the SiYuan kernel process, disrupting the availability of the knowledge management system. Organizations relying on SiYuan for critical knowledge workflows or collaboration may experience service outages, loss of productivity, and potential operational delays. Since the vulnerability requires no authentication and can be triggered remotely, it increases the attack surface and risk of automated exploitation attempts. Although confidentiality and integrity are not directly affected, the availability impact can indirectly affect business continuity and user trust. The lack of known exploits in the wild suggests limited active exploitation currently, but the ease of exploitation and high severity score indicate a strong incentive for attackers to develop exploits. Organizations using vulnerable versions in exposed network environments are at significant risk.

Mitigation Recommendations

1. Upgrade SiYuan to version 3.6.2 or later immediately to apply the official fix. 2. If immediate upgrade is not possible, restrict network access to the SiYuan WebSocket server, allowing connections only from trusted IP addresses or internal networks. 3. Implement network-level protections such as Web Application Firewalls (WAFs) or intrusion prevention systems (IPS) to detect and block malformed WebSocket messages or unusual connection parameters. 4. Monitor SiYuan server logs for unusual connection attempts containing the "auth keepalive" query parameter or malformed JSON payloads. 5. Employ runtime process monitoring and automatic restart mechanisms to reduce downtime if a crash occurs. 6. Engage with the SiYuan vendor or community for any additional patches or mitigation guidance. 7. Conduct regular security assessments and penetration testing to validate that the vulnerability is fully remediated and no similar issues exist.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T23:23:58.312Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bdda59b462d409683a8cca

Added to database: 3/20/2026, 11:38:01 PM

Last enriched: 3/28/2026, 9:37:05 PM

Last updated: 5/4/2026, 9:05:55 AM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses