{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T05:32:08.336","vulnerabilities":[{"cve":{"id":"CVE-2026-32750","sourceIdentifier":"security-advisories@github.com","published":"2026-03-19T22:16:41.303","lastModified":"2026-03-23T18:09:19.310","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"SiYuan is a personal knowledge management system. In versions 3.6.0 and below, POST /api/import/importStdMd passes the localPath parameter directly to model.ImportFromLocalPath with zero path validation. The function recursively reads every file under the given path and permanently stores their content as SiYuan note documents in the workspace database, making them searchable and accessible to all workspace users. Data persists in the workspace database across restarts and is accessible to Publish Service Reader accounts. Combined with the renderSprig SQL injection ( separate advisory ), a non-admin user can then read all imported secrets without any additional privileges. This issue has been fixed in version 3.6.1."},{"lang":"es","value":"SiYuan es un sistema de gestión de conocimiento personal. En las versiones 3.6.0 e inferiores, POST /API/import/importStdMd pasa el parámetro localPath directamente a model.ImportFromLocalPath sin ninguna validación de ruta. La función lee recursivamente cada archivo bajo la ruta dada y almacena permanentemente su contenido como documentos de nota de SiYuan en la base de datos del espacio de trabajo, haciéndolos buscables y accesibles para todos los usuarios del espacio de trabajo. Los datos persisten en la base de datos del espacio de trabajo a través de los reinicios y son accesibles para las cuentas de lector del Servicio de Publicación. Combinado con la inyección SQL renderSprig (aviso separado), un usuario no administrador puede entonces leer todos los secretos importados sin ningún privilegio adicional. Este problema ha sido solucionado en la versión 3.6.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":4.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-22"},{"lang":"en","value":"CWE-552"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*","versionEndExcluding":"3.6.1","matchCriteriaId":"E1AA6470-222A-4841-A487-DF65F9859780"}]}]}],"references":[{"url":"https://github.com/siyuan-note/siyuan/commit/13b6d3d45e83525654d120f32a3fdc5d9e95df0b","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/siyuan-note/siyuan/releases/tag/v3.6.1","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/siyuan-note/siyuan/security/advisories/GHSA-rjhh-m223-9qqv","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}