Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/siyuan-note/siyuan/kernel
  4. ›
  5. CVE-2026-32751

CVE-2026-32751: SiYuan Vulnerable to Remote Code Execution via Stored XSS in Notebook Name - Mobile Interface

March 16, 2026

SiYuan’s mobile file tree (MobileFiles.ts) renders notebook names via innerHTML without HTML escaping when processing renamenotebook WebSocket events. The desktop version (Files.ts) properly uses escapeHtml() for the same operation. An authenticated user who can rename notebooks can inject arbitrary HTML/JavaScript that executes on any mobile client viewing the file tree.

Since Electron is configured with nodeIntegration: true and contextIsolation: false, the injected JavaScript has full Node.js access, escalating stored XSS to full remote code execution. The mobile layout is also used in the Electron desktop app when the window is narrow, making this exploitable on desktop as well.

References

  • github.com/advisories/GHSA-qr46-rcv3-4hq3
  • github.com/siyuan-note/siyuan
  • github.com/siyuan-note/siyuan/security/advisories/GHSA-qr46-rcv3-4hq3
  • nvd.nist.gov/vuln/detail/CVE-2026-32751

Code Behaviors & Features

Detect and mitigate CVE-2026-32751 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 0.0.0-20260313024916-fd6526133bb3

Solution

Unfortunately, there is no solution available yet.

Impact 4.6 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

go/github.com/siyuan-note/siyuan/kernel/CVE-2026-32751.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 17 Mar 2026 12:18:28 +0000.