Browse all 6 CVE security advisories affecting TriliumNext. AI-powered Chinese analysis, POCs, and references for each vulnerability.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-39311 | Trilium Notes: Stored XSS Leads to Unauthorized Remote Code Execution (RCE) via Unsanitized SVG Attachments — TriliumCWE-79 | 6.8 | Medium | 2026-05-20 |
| CVE-2026-39310 | Trilium Notes: Authentication Bypass in Clipper API for Electron (Desktop) Builds — TriliumCWE-284 | 8.6 | High | 2026-05-20 |
| CVE-2026-39309 | Trilium Notes: macOS TCC Bypass via Prompt Spoofing — TriliumCWE-451 | 5.5 | Medium | 2026-05-19 |
| CVE-2026-35593 | Trilium Notes has Local File Inclusion via upload modified file API endpoint — TriliumCWE-22 | 6.8 | Medium | 2026-05-19 |
| CVE-2025-68621 | Trilium Notes has a Timing Attack Vulnerability in /api/login/sync — TriliumCWE-208 | 7.4 | High | 2026-02-06 |
| CVE-2025-53544 | Trilium Notes is Vulnerable to Brute-force Protection Bypass via Initial Sync Seed Retrieval — TriliumCWE-307 | 7.5 | High | 2025-08-05 |
This page lists every published CVE security advisory associated with TriliumNext. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.