Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| siyuan-note | siyuan | >= 3.6.0, < 3.6.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | SiYuan Note through version 3.6.1 is vulnerable to unauthenticated reflected Cross-Site Scripting (XSS) in the `/api/icon/getDynamicIcon` endpoint due to improper filtering of SVG elements with a namespace prefix (such as `<x:script>`). By using a namespaced script element, attackers can bypass the `SanitizeSVG` function and execute arbitrary JavaScript in the victim’s browser upon visiting a crafted link. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-34605.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2026-34449 | 9.7 CRITICAL | SiYuan: Cross-Origin RCE via Permissive CORS Policy and JavaScript Snippet Injection |
| CVE-2026-34448 | 9.1 CRITICAL | SiYuan: Stored XSS in Attribute View gallery/kanban cover rendering allows arbitrary comma |
| CVE-2026-34585 | 8.6 HIGH | SiYuan: Stored XSS in imported .sy.zip content leads to arbitrary command execution |
| CVE-2026-34453 | 7.5 HIGH | SiYuan: Broken access control in /api/bookmark/getBookmark allows unauthenticated publish |
No comments yet