CVE-2026-39846 PUBLISHED

SiYuan affected by Remote Code Execution in the Electron desktop client via stored XSS in synced table captions

Assigner: GitHub_M
Reserved: 07.04.2026 Published: 07.04.2026 Updated: 08.04.2026

SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious note synced to another user can trigger remote code execution in the SiYuan Electron desktop client. The root cause is that table caption content is stored without safe escaping and later unescaped into rendered HTML, creating a stored XSS sink. Because the desktop renderer runs with nodeIntegration enabled and contextIsolation disabled, attacker-controlled JavaScript executes with access to Node.js APIs. In practice, an attacker can import a crafted note into a synced workspace, wait for the victim to sync, and achieve code execution when the victim opens the note. This vulnerability is fixed in 3.6.4.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
CVSS Score: 9.1

Product Status

Vendor siyuan-note
Product siyuan
Versions
  • Version < 3.6.4 is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE