CVE-2026-40322 PUBLISHED

SiYuan: Mermaid `javascript:` Link Injection Leads to Stored XSS and Electron RCE

Assigner: GitHub_M
Reserved: 10.04.2026 Published: 16.04.2026 Updated: 17.04.2026

SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, Mermaid diagrams are rendered with securityLevel set to "loose", and the resulting SVG is injected into the DOM via innerHTML. This allows attacker-controlled javascript: URLs in Mermaid code blocks to survive into the rendered output. On desktop builds using Electron, windows are created with nodeIntegration enabled and contextIsolation disabled, escalating the stored XSS to arbitrary code execution when a victim opens a note containing a malicious Mermaid block and clicks the rendered diagram node. This issue has been fixed in version 3.6.4.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
CVSS Score: 9.1

Product Status

Vendor siyuan-note
Product siyuan
Versions
  • Version < 3.6.4 is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE