| Summary | SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, the fix for CVE-2026-30869 only added a denylist check (IsSensitivePath) but did not address the root cause — a redundant url.PathUnescape() call in serveExport(). An authenticated attacker can use double URL encoding (%252e%252e) to traverse directories and read arbitrary workspace files including the full SQLite database (siyuan.db), kernel log, and all user documents. This vulnerability is fixed in 3.6.5. |
|---|---|
| Publication Date | April 25, 2026, 4:17 a.m. |
| Registration Date | April 26, 2026, 4:07 a.m. |
| Last Update | April 25, 2026, 4:17 a.m. |