Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-32767 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SiYuan v3.6.0- has an **Authorization Bypass** on `/api/search/fullTextSearchBlock`. <br>πŸ’₯ **Consequences**: Leads to **Arbitrary SQL Execution**. Total compromise of data integrity and confidentiality.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-89** (SQL Injection). <br>πŸ” **Flaw**: The search endpoint fails to verify user permissions before processing SQL queries, allowing unauthenticated injection.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: **SiYuan Note** (Personal Knowledge Management). <br>πŸ“¦ **Versions**: **v3.6.0 and earlier**. <br>πŸ”§ **Component**: `/api/search/fullTextSearchBlock` endpoint.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: <br>1️⃣ **Bypass Auth**: No login required. <br>2️⃣ **Execute SQL**: Run arbitrary commands. <br>3️⃣ **Access Data**: Read/Modify/Delete all notes and user data.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. <br>πŸ”“ **Auth**: **None Required** (`PR:N`). <br>🌐 **Network**: **Remote** (`AV:N`). <br>🎯 **Complexity**: **Low** (`AC:L`). Easy to exploit.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“’ **Public Exp?**: **Yes/Imminent**. <br>πŸ”— **References**: GitHub Issue #17209 and Security Advisory GHSA-j7wh-x834-p3r7 are public. <br>⚠️ **Status**: PoCs likely circulating given the severity.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: <br>1️⃣ Check SiYuan version in settings. <br>2️⃣ Scan for `/api/search/fullTextSearchBlock` exposure. <br>3️⃣ Monitor logs for SQL errors or unauthorized search requests.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed?**: **YES**. <br>πŸ“¦ **Patch**: Upgrade to **v3.6.1**. <br>πŸ”— **Link**: [GitHub Release v3.6.1](https://github.com/siyuan-note/siyuan/releases/tag/v3.6.1).

Q9What if no patch? (Workaround)

πŸ›‘ **No Patch?**: <br>1️⃣ **Block Endpoint**: Firewall rule to deny `/api/search/fullTextSearchBlock`. <br>2️⃣ **WAF**: Deploy SQL injection protection rules. <br>3️⃣ **Isolate**: Disconnect from internet until patched.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. <br>🚨 **Priority**: **P0**. <br>πŸ’‘ **Action**: **Patch Immediately**. CVSS 9.1 (High) with no auth required makes this a high-risk target for automated attacks.