{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-25539","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-02-02T19:59:47.374Z","datePublished":"2026-02-04T21:39:12.438Z","dateUpdated":"2026-02-05T18:32:27.657Z"},"containers":{"cna":{"title":"SiYuan has Arbitrary File Write via /api/file/copyFile leading to RCE","problemTypes":[{"descriptions":[{"cweId":"CWE-22","lang":"en","description":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/siyuan-note/siyuan/security/advisories/GHSA-c4jr-5q7w-f6r9","tags":["x_refsource_CONFIRM"],"url":"https://github.com/siyuan-note/siyuan/security/advisories/GHSA-c4jr-5q7w-f6r9"},{"name":"https://github.com/siyuan-note/siyuan/commit/d7f790755edf8c78d2b4176171e5a0cdcd720feb","tags":["x_refsource_MISC"],"url":"https://github.com/siyuan-note/siyuan/commit/d7f790755edf8c78d2b4176171e5a0cdcd720feb"}],"affected":[{"vendor":"siyuan-note","product":"siyuan","versions":[{"version":"< 3.5.5","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-02-04T21:39:12.438Z"},"descriptions":[{"lang":"en","value":"SiYuan is a personal knowledge management system. Prior to version 3.5.5, the /api/file/copyFile endpoint does not validate the dest parameter, allowing authenticated users to write files to arbitrary locations on the filesystem. This can lead to Remote Code Execution (RCE) by writing to sensitive locations such as cron jobs, SSH authorized_keys, or shell configuration files. This issue has been patched in version 3.5.5."}],"source":{"advisory":"GHSA-c4jr-5q7w-f6r9","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/siyuan-note/siyuan/security/advisories/GHSA-c4jr-5q7w-f6r9","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-05T18:32:24.271345Z","id":"CVE-2026-25539","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-05T18:32:27.657Z"}}]}}