{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T21:29:28.446","vulnerabilities":[{"cve":{"id":"CVE-2026-25992","sourceIdentifier":"security-advisories@github.com","published":"2026-02-10T18:16:38.807","lastModified":"2026-02-23T17:58:09.347","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"SiYuan is a personal knowledge management system. Prior to 3.5.5, the /api/file/getFile endpoint uses case-sensitive string equality checks to block access to sensitive files. On case-insensitive file systems such as Windows, attackers can bypass restrictions using mixed-case paths and read protected configuration files. This vulnerability is fixed in 3.5.5."},{"lang":"es","value":"SiYuan es un sistema de gestión de conocimiento personal. Antes de la versión 3.5.5, el endpoint /api/file/getFile utiliza comprobaciones de igualdad de cadenas que distinguen entre mayúsculas y minúsculas para bloquear el acceso a archivos sensibles. En sistemas de archivos que no distinguen entre mayúsculas y minúsculas, como Windows, los atacantes pueden eludir las restricciones utilizando rutas con mayúsculas y minúsculas mezcladas y leer archivos de configuración protegidos. Esta vulnerabilidad se corrigió en la versión 3.5.5."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.5","matchCriteriaId":"D3F6A2E5-099B-4ED7-B1D4-CC2E4DFECF3D"}]}]}],"references":[{"url":"https://github.com/siyuan-note/siyuan/releases/tag/v3.5.5","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/siyuan-note/siyuan/security/advisories/GHSA-f72r-2h5j-7639","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}