SiYuan is a personal knowledge management system. Prior to version 3.1.16, an arbitrary file read vulnerability exists in Siyuan's `/api/template/render` endpoint. The absence of proper validation on the path parameter allows attackers to access sensitive files on the host system. Version 3.1.16 contains a patch for the issue.
References
Configurations
History
05 Jun 2025, 20:41
Type | Values Removed | Values Added |
---|---|---|
First Time |
B3log
B3log siyuan |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://github.com/siyuan-note/siyuan/commit/e70ed57f6e4852e2bd702671aeb8eb3a47a36d71 - Patch | |
References | () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-xx68-37v4-4596 - Vendor Advisory | |
Summary |
|
|
CPE | cpe:2.3:a:b3log:siyuan:3.1.15:-:*:*:*:*:*:* |
12 Dec 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-12 02:15
Updated : 2025-06-05 20:41
NVD link : CVE-2024-55657
Mitre link : CVE-2024-55657
CVE.ORG link : CVE-2024-55657
JSON object : View
Products Affected
b3log
- siyuan
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')