SiYuan is a personal knowledge management system. Prior to version 3.1.16, SiYuan's /api/export/exportResources endpoint is vulnerable to arbitary file read via path traversal. It is possible to manipulate the paths parameter to access and download arbitrary files from the host system by traversing the workspace directory structure. Version 3.1.16 contains a patch for the issue.
References
Configurations
History
05 Jun 2025, 20:41
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:b3log:siyuan:3.1.15:-:*:*:*:*:*:* | |
Summary |
|
|
References | () https://github.com/siyuan-note/siyuan/commit/e70ed57f6e4852e2bd702671aeb8eb3a47a36d71 - Patch | |
References | () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-25w9-wqfq-gwqx - Vendor Advisory | |
First Time |
B3log
B3log siyuan |
12 Dec 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-12 02:15
Updated : 2025-06-05 20:41
NVD link : CVE-2024-55658
Mitre link : CVE-2024-55658
CVE.ORG link : CVE-2024-55658
JSON object : View
Products Affected
b3log
- siyuan
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')