Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34453: CWE-863: Incorrect Authorization in siyuan-note siyuan

0
High
VulnerabilityCVE-2026-34453cvecve-2026-34453cwe-863
Published: Tue Mar 31 2026 (03/31/2026, 21:43:32 UTC)
Source: CVE Database V5
Vendor/Project: siyuan-note
Product: siyuan

Description

CVE-2026-34453 is a high-severity authorization vulnerability in SiYuan Note versions prior to 3. 6. 2. The flaw allows unauthenticated users to access bookmarked blocks from password-protected documents via the publish service. This occurs because the filtering function incorrectly treats a nil context as authorized, bypassing password checks. Exploiting this vulnerability does not require authentication or user interaction and can lead to unauthorized disclosure of sensitive content. The issue affects the publish/read-only mode endpoint /api/bookmark/getBookmark. The vulnerability has been patched in version 3. 6. 2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 22:08:48 UTC

Technical Analysis

SiYuan Note is a personal knowledge management system that allows users to create and publish content, including password-protected documents. Prior to version 3.6.2, a critical authorization flaw (CVE-2026-34453) exists in the publish service's handling of bookmarked blocks within these protected documents. Specifically, when accessing the endpoint /api/bookmark/getBookmark in publish/read-only mode, the system filters bookmarks by invoking the function FilterBlocksByPublishAccess with a nil context parameter. This nil context is erroneously interpreted as an authorized context, causing the function to skip the password verification step. Consequently, any unauthenticated visitor who can reach the publish service can retrieve bookmarked blocks from documents that are meant to be protected by a password, provided that at least one block in the document is bookmarked. This bypasses the intended access control and exposes potentially sensitive information without requiring any credentials or user interaction. The vulnerability is classified under CWE-863 (Incorrect Authorization) and has a CVSS v3.1 score of 7.5, reflecting its high severity. The flaw impacts confidentiality but does not affect integrity or availability. The issue was publicly disclosed on March 31, 2026, and has been addressed in SiYuan Note version 3.6.2. No public exploits have been observed in the wild to date.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of sensitive or confidential information stored within password-protected documents in SiYuan Note. Organizations relying on SiYuan Note for personal or collaborative knowledge management may inadvertently expose proprietary, private, or regulated data to any unauthenticated user who can access the publish service endpoint. This can lead to data breaches, loss of intellectual property, and compliance violations, especially if sensitive business or personal information is involved. Since the vulnerability does not require authentication or user interaction, it can be exploited remotely and at scale if the publish service is publicly accessible. Although no integrity or availability impact is reported, the breach of confidentiality alone can have severe reputational and financial consequences. The risk is heightened in environments where SiYuan Note is used for critical documentation or where password protection is relied upon as a primary access control mechanism.

Mitigation Recommendations

1. Immediate upgrade to SiYuan Note version 3.6.2 or later, where the vulnerability is patched. 2. Restrict network access to the publish service endpoint (/api/bookmark/getBookmark) to trusted users or internal networks only, using firewall rules or VPNs, until the patch can be applied. 3. Review and audit published documents for any sensitive bookmarked blocks that may have been exposed prior to patching. 4. Implement additional access controls or authentication layers in front of the publish service to prevent unauthorized access. 5. Educate users on the risks of relying solely on password protection within SiYuan Note and encourage use of complementary security measures such as encryption or role-based access controls. 6. Monitor logs and network traffic for unusual access patterns to the publish service that could indicate exploitation attempts. 7. If possible, disable the publish/read-only mode temporarily if it is not essential to operations until the patch is applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-27T18:18:14.895Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cc424fe6bfc5ba1d44f4be

Added to database: 3/31/2026, 9:53:19 PM

Last enriched: 3/31/2026, 10:08:48 PM

Last updated: 3/31/2026, 11:19:16 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses