CVE-2024-55658

SiYuan is a personal knowledge management system. Prior to version 3.1.16, SiYuan's /api/export/exportResources endpoint is vulnerable to arbitary file read via path traversal. It is possible to manipulate the paths parameter to access and download arbitrary files from the host system by traversing the workspace directory structure. Version 3.1.16 contains a patch for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:b3log:siyuan:3.1.15:-:*:*:*:*:*:*

History

05 Jun 2025, 20:41

Type Values Removed Values Added
References () https://github.com/siyuan-note/siyuan/commit/e70ed57f6e4852e2bd702671aeb8eb3a47a36d71 - () https://github.com/siyuan-note/siyuan/commit/e70ed57f6e4852e2bd702671aeb8eb3a47a36d71 - Patch
References () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-25w9-wqfq-gwqx - () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-25w9-wqfq-gwqx - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:b3log:siyuan:3.1.15:-:*:*:*:*:*:*
First Time B3log siyuan
B3log

12 Dec 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-12 02:15

Updated : 2025-06-05 20:41


NVD link : CVE-2024-55658

Mitre link : CVE-2024-55658

CVE.ORG link : CVE-2024-55658


JSON object : View

Products Affected

b3log

  • siyuan
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')