CVE-2026-33476 - Vulnerability Analysis
HighCVSS: 7.5Last Updated: March 23, 2026
SiYuan - Path Traversal
Overview
SiYuan < 3.6.2 contains a path traversal caused by improper path sanitization in the /appearance/*filepath endpoint, letting unauthenticated attackers read arbitrary files accessible to the server process, exploit requires no authentication.
Severity & Score
Impact
Unauthenticated attackers can read arbitrary files accessible to the server, potentially exposing sensitive information.
Mitigation
Update to version 3.6.2 or later.
References
Social Media Activity(1 post)
š CVE-2026-33476 - High (7.5) SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Siyuan kernel exposes an unauthenticated file-serving endpoint under `/appearance/*filepath.` Due to improper path sanitization, attackers can perform directory traversa... š https://www.thehackerwire.com/vulnerability/CVE-2026-33476/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-33476
- Severity
- High
- CVSS Score
- 7.5
- Type
- path_traversal
- Status
- confirmed
- EPSS
- 88.7%
- Social Posts
- 1
CWE
- CWE-22
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N