Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-34449
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-31 Mar, 2026 | 22:16
Updated At-03 Apr, 2026 | 16:57

SiYuan is a personal knowledge management system. Prior to version 3.6.2, a malicious website can achieve Remote Code Execution (RCE) on any desktop running SiYuan by exploiting the permissive CORS policy (Access-Control-Allow-Origin: * + Access-Control-Allow-Private-Network: true) to inject a JavaScript snippet via the API. The injected snippet executes in Electron's Node.js context with full OS access the next time the user opens SiYuan's UI. No user interaction is required beyond visiting the malicious website while SiYuan is running. This issue has been patched in version 3.6.2.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.6CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.6
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CPE Matches

b3log
b3log
>>siyuan>>Versions before 3.6.2(exclusive)
cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-942Secondarysecurity-advisories@github.com
CWE ID: CWE-942
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/siyuan-note/siyuan/issues/17246security-advisories@github.com
Issue Tracking
https://github.com/siyuan-note/siyuan/releases/tag/v3.6.2security-advisories@github.com
Release Notes
https://github.com/siyuan-note/siyuan/security/advisories/GHSA-68p4-j234-43mvsecurity-advisories@github.com
Exploit
Vendor Advisory
https://github.com/siyuan-note/siyuan/security/advisories/GHSA-68p4-j234-43mv134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit
Vendor Advisory
Hyperlink: https://github.com/siyuan-note/siyuan/issues/17246
Source: security-advisories@github.com
Resource:
Issue Tracking
Hyperlink: https://github.com/siyuan-note/siyuan/releases/tag/v3.6.2
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/siyuan-note/siyuan/security/advisories/GHSA-68p4-j234-43mv
Source: security-advisories@github.com
Resource:
Exploit
Vendor Advisory
Hyperlink: https://github.com/siyuan-note/siyuan/security/advisories/GHSA-68p4-j234-43mv
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
Exploit
Vendor Advisory
Change History
0Changes found

Details not found