SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Siyuan kernel exposes an unauthenticated file-serving endpoint under `/appearance/*filepath.` Due to improper path sanitization, attackers can perform directory traversal and read arbitrary files accessible to the server process. Authentication checks explicitly exclude this endpoint, allowing exploitation without valid credentials. Version 3.6.2 fixes this issue.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Mar 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Siyuan kernel exposes an unauthenticated file-serving endpoint under `/appearance/*filepath.` Due to improper path sanitization, attackers can perform directory traversal and read arbitrary files accessible to the server process. Authentication checks explicitly exclude this endpoint, allowing exploitation without valid credentials. Version 3.6.2 fixes this issue. | |
| Title | SiYuan has an Unauthenticated Arbitrary File Read via Path Traversal | |
| Weaknesses | CWE-22 CWE-73 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-03-20T22:34:40.051Z
Updated: 2026-03-20T22:34:40.051Z
Reserved: 2026-03-20T16:16:48.970Z
Link: CVE-2026-33476
No data.
Status : Received
Published: 2026-03-20T23:16:48.137
Modified: 2026-03-20T23:16:48.137
Link: CVE-2026-33476
No data.
ReportizFlow