Path Traversal Vulnerability in SiYuan Personal Knowledge Management System
CVE-2026-40318

8.5HIGH

Key Information:

Status
Vendor
CVE Published:
16 April 2026

What is CVE-2026-40318?

The SiYuan personal knowledge management system has a vulnerability in versions 3.6.3 and earlier that allows attackers to exploit the /api/av/removeUnusedAttributeView endpoint. The vulnerability arises from the lack of proper validation and boundary enforcement on a user-controlled id parameter, which can be manipulated to include path traversal sequences. This enables an attacker to escape the intended directory and potentially delete critical files, such as global configuration files and workspace metadata. The issue has been resolved in version 3.6.4, emphasizing the need for users to update their installations to safeguard against unauthorized file access.

Affected Version(s)

siyuan < 3.6.4

References

CVSS V3.1

Score:
8.5
Severity:
HIGH
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.