Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
SiYuan: Stored XSS via Attribute View name to Electron renderer RCE in SiYuan
Vulnerability Description
SiYuan is an open-source personal knowledge management system. Prior to 3.7.0, the kernel stores Attribute View (AV / database) names without any HTML escape, then a render template uses raw strings.ReplaceAll(tpl, "${avName}", nodeAvName) to embed the name in HTML before pushing to all clients via WebSocket. Three independent client paths (render.ts:120 → outerHTML, Title.ts:401 → innerHTML, transaction.ts:559 → innerHTML) consume the value without escaping. Because the main BrowserWindow runs nodeIntegration:true, contextIsolation:false, webSecurity:false (app/electron/main.js:407-411), HTML injection in the renderer becomes Node.js code execution. This vulnerability is fixed in 3.7.0.
CVSS Information
N/A
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
SiYuan 跨站脚本漏洞
Vulnerability Description
SiYuan是SiYuan开源的一个个人知识管理系统。 SiYuan 3.7.0之前版本存在跨站脚本漏洞,该漏洞源于内核存储属性视图名称时未进行HTML转义,导致HTML注入并最终实现Node.js代码执行。
CVSS Information
N/A
Vulnerability Type
N/A