TopVuln

High-risk vulnerability digests

CVE-2026-32938

  • CRITICAL

Details

CVSS v3
9.9
NVD published
2026-03-20 04:16:48
Affected versions
SiYuan 3.6.0 and below
Summary
This vulnerability exists in SiYuan's HTML paste endpoint, which copies local files from user-supplied file:// links without proper path validation. An unauthenticated or low-privileged attacker can trigger copying of sensitive system files, then exfiltrate the files via the public asset endpoint. Successful exploitation leads to full exposure of sensitive data on the host.
Remediation
Upgrade SiYuan to version 3.6.1 or newer to fix the path validation issue. If you cannot upgrade immediately, restrict public access to your SiYuan instance and enforce strong authentication for all asset endpoints.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.