Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/siyuan-note/siyuan/kernel
  4. ›
  5. CVE-2026-40318

CVE-2026-40318: SiYuan: Publish Reader Path Traversal Delete via `removeUnusedAttributeView`

April 10, 2026 (updated April 24, 2026)

The endpoint /api/av/removeUnusedAttributeView is vulnerable to a path traversal (CWE-22) that allows an attacker to delete arbitrary .json files on the server.

The issue arises because user-controlled input (id) is directly used in filesystem path construction without validation or restriction.

Access to this endpoint (e.g., via a Reader-role or publish context) is considered a precondition and not part of the vulnerability. The root cause is unsafe path handling.


References

  • github.com/advisories/GHSA-vw86-c94w-v3x4
  • github.com/siyuan-note/siyuan
  • github.com/siyuan-note/siyuan/releases/tag/v3.6.4
  • github.com/siyuan-note/siyuan/security/advisories/GHSA-vw86-c94w-v3x4
  • nvd.nist.gov/vuln/detail/CVE-2026-40318

Code Behaviors & Features

Detect and mitigate CVE-2026-40318 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.6.40.0.0-20260407035653-2f416e5253f1

Fixed versions

  • 3.6.40.0.0-20260407035653-2f416e5253f1

Solution

Upgrade to version 3.6.40.0.0-20260407035653-2f416e5253f1 or above.

Impact 8.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H

Learn more about CVSS

Weakness

  • CWE-24: Path Traversal: '../filedir'

Source file

go/github.com/siyuan-note/siyuan/kernel/CVE-2026-40318.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:12 +0000.