Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases. In versions below 0.97.0, a brute-force protection bypass in the initial sync seed retrieval endpoint allows unauthenticated attackers to guess the login password without triggering rate limiting. Trilium is a single-user app without a username requirement, and brute-force protection bypass makes exploitation much more feasible. Multiple features provided by Trilium (e.g. MFA, share notes, custom request handler) indicate that Trilium can be exposed to the internet. This is fixed in version 0.97.0.
References
Configurations
No configuration.
History
05 Aug 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/TriliumNext/Trilium/security/advisories/GHSA-hw5p-ff75-327r - | |
Summary |
|
05 Aug 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-05 01:15
Updated : 2025-08-05 14:34
NVD link : CVE-2025-53544
Mitre link : CVE-2025-53544
CVE.ORG link : CVE-2025-53544
JSON object : View
Products Affected
No product.
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts