{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-33476","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-20T16:16:48.970Z","datePublished":"2026-03-20T22:34:40.051Z","dateUpdated":"2026-03-23T21:41:45.226Z"},"containers":{"cna":{"title":"SiYuan has an Unauthenticated Arbitrary File Read via Path Traversal","problemTypes":[{"descriptions":[{"cweId":"CWE-22","lang":"en","description":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-73","lang":"en","description":"CWE-73: External Control of File Name or Path","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/siyuan-note/siyuan/security/advisories/GHSA-hhgj-gg9h-rjp7","tags":["x_refsource_CONFIRM"],"url":"https://github.com/siyuan-note/siyuan/security/advisories/GHSA-hhgj-gg9h-rjp7"},{"name":"https://github.com/siyuan-note/siyuan/commit/009bb598b3beccc972aa5f1ed88b3b224326bf2a","tags":["x_refsource_MISC"],"url":"https://github.com/siyuan-note/siyuan/commit/009bb598b3beccc972aa5f1ed88b3b224326bf2a"}],"affected":[{"vendor":"siyuan-note","product":"siyuan","versions":[{"version":"< 3.6.2","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-20T22:34:40.051Z"},"descriptions":[{"lang":"en","value":"SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Siyuan kernel exposes an unauthenticated file-serving endpoint under `/appearance/*filepath.` Due to improper path sanitization, attackers can perform directory traversal and read arbitrary files accessible to the server process. Authentication checks explicitly exclude this endpoint, allowing exploitation without valid credentials. Version 3.6.2 fixes this issue."}],"source":{"advisory":"GHSA-hhgj-gg9h-rjp7","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/siyuan-note/siyuan/security/advisories/GHSA-hhgj-gg9h-rjp7","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-23T20:53:12.729058Z","id":"CVE-2026-33476","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-23T21:41:45.226Z"}}]}}