Description

SiYuan is a personal knowledge management system. Versions 3.6.0 and below render package metadata fields (displayName, description) using template literals without HTML escaping. A malicious package author can inject arbitrary HTML/JavaScript into these fields, which executes automatically when any user browses the Bazaar page. Because SiYuan's Electron configuration enables nodeIntegration: true with contextIsolation: false, this XSS escalates directly to full Remote Code Execution on the victim's operating system — with zero user interaction beyond opening the marketplace tab. This issue has been fixed in version 3.6.1.

INFO

Published Date :

2026-03-20T08:14:53.500Z

Last Modified :

2026-03-20T18:07:28.928Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-33067 vulnerability.

Vendors Products
B3log
  • Siyuan
Siyuan
  • Siyuan
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33067.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact