Description
SiYuan is a personal knowledge management system. Versions prior to 3.5.4 contain a logic vulnerability in the /api/file/globalCopyFiles endpoint. The function allows authenticated users to copy files from any location on the server's filesystem into the application's workspace without proper path validation. The vulnerability exists in the api/file.go source code. The function globalCopyFiles accepts a list of source paths (srcs) from the JSON request body. While the code checks if the source file exists using filelock.IsExist(src), it fails to validate whether the source path resides within the authorized workspace directory. Version 3.5.4 patches the issue.
References (4)
Core 4
Core References
Vendor Advisory, Exploit, Patch x_refsource_confirm
https://github.com/siyuan-note/siyuan/security/advisories/GHSA-94c7-g2fj-7682
Issue Tracking, Patch x_refsource_misc
https://github.com/siyuan-note/siyuan/issues/16860
Patch x_refsource_misc
https://github.com/siyuan-note/siyuan/commit/b2274baba2e11c8cf8901b0c5c871e5b27f1f6dd
Patch x_refsource_misc
https://github.com/siyuan-note/siyuan/commit/f8f4b517077b92c90c0d7b51ac11be1b34b273ad
Scores
CVSS v3
6.5
EPSS
0.0005
EPSS Percentile
14.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (2)
b3log/siyuan
< 3.5.4
siyuan-note/siyuan
0 - 0.0.0-20260118092521-f8f4b517077bGo
Published
Jan 19, 2026
Tracked Since
Feb 18, 2026