CVE-2026-40318

Published Apr 16, 2026

Last updated 11 days ago

Overview

Description
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and prior, the /api/av/removeUnusedAttributeView endpoint constructs a filesystem path using the user-controlled id parameter without validation or path boundary enforcement. An attacker can inject path traversal sequences such as ../ into the id value to escape the intended directory and delete arbitrary .json files on the server, including global configuration files and workspace metadata. This issue has been fixed in version 3.6.4.
Source
security-advisories@github.com
NVD status
Analyzed
Products
siyuan

Risk scores

CVSS 3.1

Type
Secondary
Base score
8.5
Impact score
4.7
Exploitability score
3.1
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
Severity
HIGH

Weaknesses

security-advisories@github.com
CWE-24

Social media

Hype score
Not currently trending

Configurations