CVE-2026-30869 - Vulnerability Analysis
CriticalCVSS: 9.3Last Updated: March 11, 2026
SiYuan - Path Traversal
Overview
SiYuan < 3.5.10 contains a path traversal caused by double-encoded traversal sequences in the /export endpoint, letting attackers read arbitrary files including sensitive configuration files, exploit requires crafted requests.
Severity & Score
Impact
Attackers can read sensitive files, potentially gaining administrative access and enabling further remote code execution.
Mitigation
Update to version 3.5.10 or later.
Social Media Activity(1 post)
šØ EUVD-2026-25626 š Score: 7.1/10 (CVSS v3.1) š¦ Product: SiYuan š¢ Vendor: siyuan-note š Updated: 2026-04-24 š SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, the fix for CVE-2026-30869 only added a denylist check (IsSensitivePath) but did not address the root cause ā a redundant url.PathUnescape() call in serveExport(). An authentic... š https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-25626 #cybersecurity #infosec #euvd #cve #vulnerability
View original postRelated Resources
Details
- CVE ID
- CVE-2026-30869
- Severity
- Critical
- CVSS Score
- 9.3
- Type
- path_traversal
- Status
- unconfirmed
- EPSS
- 67.7%
- Social Posts
- 1
CWE
- CWE-22
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L