CVE-2024-55657

SiYuan is a personal knowledge management system. Prior to version 3.1.16, an arbitrary file read vulnerability exists in Siyuan's `/api/template/render` endpoint. The absence of proper validation on the path parameter allows attackers to access sensitive files on the host system. Version 3.1.16 contains a patch for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:b3log:siyuan:3.1.15:-:*:*:*:*:*:*

History

05 Jun 2025, 20:41

Type Values Removed Values Added
References () https://github.com/siyuan-note/siyuan/commit/e70ed57f6e4852e2bd702671aeb8eb3a47a36d71 - () https://github.com/siyuan-note/siyuan/commit/e70ed57f6e4852e2bd702671aeb8eb3a47a36d71 - Patch
References () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-xx68-37v4-4596 - () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-xx68-37v4-4596 - Vendor Advisory
CPE cpe:2.3:a:b3log:siyuan:3.1.15:-:*:*:*:*:*:*
First Time B3log siyuan
B3log
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

12 Dec 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-12 02:15

Updated : 2025-06-05 20:41


NVD link : CVE-2024-55657

Mitre link : CVE-2024-55657

CVE.ORG link : CVE-2024-55657


JSON object : View

Products Affected

b3log

  • siyuan
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')