Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34448: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in siyuan-note siyuan

0
Critical
VulnerabilityCVE-2026-34448cvecve-2026-34448cwe-79cwe-94
Published: Tue Mar 31 2026 (03/31/2026, 21:44:36 UTC)
Source: CVE Database V5
Vendor/Project: siyuan-note
Product: siyuan

Description

CVE-2026-34448 is a critical stored cross-site scripting (XSS) vulnerability in SiYuan, a personal knowledge management system, affecting versions prior to 3. 6. 2. An attacker can inject malicious URLs into an Attribute View mAsse field, which are then interpreted as image sources without proper validation or escaping. When a victim opens the Gallery or Kanban view with the “Cover From -> Asset Field” enabled, the malicious script executes. Due to the Electron desktop client’s configuration—nodeIntegration enabled and contextIsolation disabled—the XSS can escalate to arbitrary OS command execution under the victim’s user account. This vulnerability impacts confidentiality, integrity, and availability severely and requires only limited privileges and user interaction to exploit. The issue has been patched in version 3. 6. 2, but unpatched systems remain at high risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 22:09:04 UTC

Technical Analysis

CVE-2026-34448 is a critical stored cross-site scripting vulnerability in the SiYuan personal knowledge management system, specifically affecting versions before 3.6.2. The vulnerability arises from improper input neutralization (CWE-79) during web page generation, where attacker-controlled URLs placed in the Attribute View mAsse field are accepted as image sources without proper validation or escaping. The vulnerable code treats arbitrary HTTP(S) URLs without file extensions as images and stores them in the coverURL attribute, which is directly injected into an <img src="..."> HTML attribute. When a user opens the Gallery or Kanban view with the “Cover From -> Asset Field” feature enabled, the malicious URL triggers stored XSS. Critically, the SiYuan desktop client is built on Electron with nodeIntegration enabled and contextIsolation disabled, allowing the injected JavaScript to execute with elevated privileges, leading to arbitrary OS command execution under the victim’s user account. This escalation from XSS to OS command execution significantly increases the threat severity. The vulnerability requires the attacker to have the ability to insert malicious URLs into the system and the victim to open the affected views, implying limited privilege and user interaction requirements. The flaw has been addressed in SiYuan version 3.6.2, but unpatched versions remain vulnerable. No known exploits are reported in the wild yet, but the high CVSS score (9.1) reflects the critical nature of this vulnerability.

Potential Impact

The impact of CVE-2026-34448 is severe for organizations using SiYuan versions prior to 3.6.2. Exploitation allows attackers to execute arbitrary JavaScript code in the context of the Electron desktop client, which due to nodeIntegration and disabled contextIsolation, can escalate to arbitrary OS command execution under the logged-in user’s privileges. This compromises confidentiality by potentially exposing sensitive knowledge management data, integrity by allowing data manipulation or injection of malicious content, and availability by enabling destructive commands or malware deployment. The attack vector requires the attacker to insert malicious URLs and rely on user interaction, but the scope includes any user opening the vulnerable views, making it a significant risk in collaborative environments. Organizations relying on SiYuan for knowledge management, especially those handling sensitive or proprietary information, face risks of data breaches, lateral movement within networks, and persistent footholds if exploited. The vulnerability’s exploitation could also facilitate further attacks on organizational infrastructure through compromised endpoints.

Mitigation Recommendations

To mitigate CVE-2026-34448, organizations should immediately upgrade SiYuan to version 3.6.2 or later, where the vulnerability is patched. Additionally, review and harden Electron application configurations by disabling nodeIntegration and enabling contextIsolation to reduce the risk of JavaScript escalation to OS command execution. Implement strict input validation and sanitization for all user-controllable fields, especially those that accept URLs or HTML content. Employ Content Security Policy (CSP) headers where applicable to restrict script execution contexts. Conduct regular security audits and penetration testing focused on Electron-based applications to identify similar misconfigurations. Educate users about the risks of opening untrusted content within the application. For environments where immediate patching is not feasible, consider restricting network access to the SiYuan application and monitoring for suspicious activities related to the vulnerable views. Finally, maintain robust endpoint detection and response (EDR) capabilities to detect and respond to potential exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-27T18:18:14.895Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cc424fe6bfc5ba1d44f4a5

Added to database: 3/31/2026, 9:53:19 PM

Last enriched: 3/31/2026, 10:09:04 PM

Last updated: 4/1/2026, 5:36:28 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses