Kritische Datei-Lesevulnerabilität in SiYuan CVE-2026-30869
⚠️ CVE-Referenzen:
CVE-2026-30869
Zusammenfassung
Eine schwerwiegende Sicherheitslücke im SiYuan-Notizmanagement-System ermöglicht es Angreifern, beliebige Dateien vom Server-Dateisystem auszulesen, darunter sensible Konfigurationsdateien mit Zugangscodes und API-Tokens. Dies kann zu unbefugtem Administratorzugriff auf die SiYuan-Kernel-API und unter Umständen sogar zu Remote-Code-Ausführung führen.
Siyuan-note - Siyuan - CRITICAL - CVE-2026-30869.
A path traversal vulnerability exists in the SiYuan Personal Knowledge Management System allowing attackers to read arbitrary files from the server's filesystem through the /export endpoint. By exploiting double-encoded traversal sequences, attackers can access sensitive information such as configuration files, including conf/conf.json, which may contain crucial secrets like API tokens and workspace authentication codes. Such exposure can lead to unauthorized administrative access to the SiYuan kernel API and, under certain circumstances, could be leveraged for remote code execution.
Quelle: securityvulnerability.io