Description
SiYuan is a personal knowledge management system. In versions 3.6.0 and below, POST /api/import/importStdMd passes the localPath parameter directly to model.ImportFromLocalPath with zero path validation. The function recursively reads every file under the given path and permanently stores their content as SiYuan note documents in the workspace database, making them searchable and accessible to all workspace users. Data persists in the workspace database across restarts and is accessible to Publish Service Reader accounts. Combined with the renderSprig SQL injection ( separate advisory ), a non-admin user can then read all imported secrets without any additional privileges. This issue has been fixed in version 3.6.1.
INFO
Published Date :
2026-03-19T21:15:32.358Z
Last Modified :
2026-03-19T21:15:32.358Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-32750 vulnerability.
| Vendors | Products |
|---|---|
| Siyuan |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-32750.