{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-32938","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-17T00:05:53.282Z","datePublished":"2026-03-20T03:19:33.505Z","dateUpdated":"2026-03-20T15:47:02.647Z"},"containers":{"cna":{"title":"SiYuan has an Arbitrary File Read in its Desktop Publish Service","problemTypes":[{"descriptions":[{"cweId":"CWE-22","lang":"en","description":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-200","lang":"en","description":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-284","lang":"en","description":"CWE-284: Improper Access Control","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.9,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/siyuan-note/siyuan/security/advisories/GHSA-fq2j-j8hc-8vw8","tags":["x_refsource_CONFIRM"],"url":"https://github.com/siyuan-note/siyuan/security/advisories/GHSA-fq2j-j8hc-8vw8"},{"name":"https://github.com/siyuan-note/siyuan/commit/294b8b429dea152cd1df522cddf406054c1619ad","tags":["x_refsource_MISC"],"url":"https://github.com/siyuan-note/siyuan/commit/294b8b429dea152cd1df522cddf406054c1619ad"},{"name":"https://github.com/siyuan-note/siyuan/releases/tag/v3.6.1","tags":["x_refsource_MISC"],"url":"https://github.com/siyuan-note/siyuan/releases/tag/v3.6.1"}],"affected":[{"vendor":"siyuan-note","product":"siyuan","versions":[{"version":"< 3.6.1","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-20T03:19:33.505Z"},"descriptions":[{"lang":"en","value":"SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the /api/lute/html2BlockDOM on the desktop copies local files pointed to by file:// links in pasted HTML into the workspace assets directory without validating paths against a sensitive-path list. Together with GET /assets/*path, which only requires authentication, a publish-service visitor can cause the desktop kernel to copy any readable sensitive file and then read it via GET, leading to exfiltration of sensitive files. This issue has been fixed in version 3.6.1."}],"source":{"advisory":"GHSA-fq2j-j8hc-8vw8","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-20T15:46:52.839742Z","id":"CVE-2026-32938","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-20T15:47:02.647Z"}}]}}