Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-33670: SiYuan readDir Path Traversal Notebook Enumeration (CVSS 9.8)
CVE-2026-33670: SiYuan readDir Path Traversal Notebook Enumeration (CVSS 9.8)

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-33670

CVE-2026-33670: SiYuan readDir Path Traversal Notebook Enumeration (CVSS 9.8)

A critical path traversal vulnerability in SiYuan's /api/file/readDir interface allows unauthenticated remote attackers to traverse notebook directories and enumerate all document filenames in any notebook. Patched in version 3.6.2.

Dylan H.

Security Team

March 27, 2026
4 min read

Affected Products

  • SiYuan < 3.6.2

Overview

CVE-2026-33670 is a critical path traversal vulnerability in SiYuan, an open-source personal knowledge management system. Prior to version 3.6.2, the /api/file/readDir interface failed to restrict directory traversal, allowing unauthenticated attackers to enumerate the filenames of all documents stored under any notebook in the SiYuan data directory.

The vulnerability is assigned a CVSS v3.1 base score of 9.8 (Critical) and is classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory — Path Traversal). It is published under GitHub Security Advisory GHSA-xmw9-6r43-x9ww.

This CVE was disclosed the same day as the closely related CVE-2026-33669, which exploits the same readDir interface to also expose full document content via a chained API call.


Technical Details

SiYuan runs a local HTTP server that backs its web-based interface. The /api/file/readDir endpoint is designed to list directory contents within SiYuan's data storage, but the implementation does not:

  1. Authenticate callers — any client with network access can call the endpoint
  2. Restrict the traversal path — the endpoint accepts caller-supplied path parameters and does not enforce containment within the SiYuan data directory

An attacker can supply crafted path parameters to traverse beyond the intended data boundaries and retrieve the filenames of all documents (.sy files) contained in any notebook. While this CVE specifically addresses filename enumeration, the information returned is directly usable in subsequent attacks — including content extraction via CVE-2026-33669 or targeted deletion/modification if write-capable endpoints are similarly unprotected.

What Does Enumeration Expose?

SiYuan document filenames follow the pattern YYYYMMDDHHMMSS-hash.sy (e.g., 20250317162531-abc123de.sy). While the filename itself is not the document's title, the traversal response may also expose:

  • Full directory tree structure of the notebook
  • Document hierarchy and folder organisation
  • Document ID components needed for further API calls

This metadata can reveal the structure and scope of sensitive information stored in the knowledge base before an attacker proceeds to content extraction.


Affected Versions

SoftwareAffected VersionsFixed Version
SiYuanAll versions prior to 3.6.23.6.2

CVSS Score Breakdown

MetricValue
Base Score9.8 (Critical)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
CWECWE-22 (Path Traversal)

Relationship to CVE-2026-33669

These two CVEs form a natural attack chain:

CVEInterfaceAction
CVE-2026-33670/api/file/readDirTraverse notebook directory, enumerate document filenames and IDs
CVE-2026-33669/api/block/getChildBlocksUse enumerated IDs to read full document content

Together, the two vulnerabilities enable complete, unauthenticated exfiltration of the entire SiYuan knowledge base. Both are fixed in version 3.6.2.


Exposure Context

Risk is highest for SiYuan instances deployed in network-accessible configurations:

  • Server or NAS deployments with the SiYuan port reachable over LAN or internet
  • Port-forwarded or reverse-proxied SiYuan instances
  • Cloud VMs or containers with the SiYuan port exposed
  • Shared office or campus networks where untrusted devices can reach the host

Local-only deployments (where SiYuan binds to 127.0.0.1 with no forwarding) are not directly exploitable from the network, though local privilege escalation or compromised applications on the same host could still trigger the vulnerability.


Patch & Mitigation

Primary fix: Upgrade to SiYuan version 3.6.2 or later. The patch adds proper path validation and authentication enforcement to the readDir endpoint.

Interim mitigations:

  1. Bind SiYuan to localhost — ensure the HTTP server listens only on 127.0.0.1:6806, not on 0.0.0.0 or a LAN-accessible interface.
  2. Firewall the SiYuan port — block external access to port 6806 (or whichever port SiYuan is configured to use).
  3. Add an authentication layer if serving SiYuan remotely — use an authenticating reverse proxy (e.g., nginx with auth_basic, Authelia, Authentik) in front of the SiYuan HTTP server.
  4. Audit access logs for unexpected requests to /api/file/readDir from non-localhost sources.

Recommendations

Any SiYuan deployment accessible beyond localhost should be considered compromised until:

  1. The instance is upgraded to version 3.6.2 or later
  2. Access logs are reviewed for evidence of traversal activity
  3. Stored documents containing sensitive information are assessed for potential exfiltration

Given that both CVE-2026-33670 and CVE-2026-33669 are low-complexity, zero-authentication vulnerabilities, treat any network-accessible pre-3.6.2 instance as fully compromised from a data confidentiality standpoint.

#CVE#SiYuan#Path Traversal#CWE-22#Knowledge Management#API Security#NVD

Related Articles

CVE-2026-33669: SiYuan Unauthenticated Document Content Exposure (CVSS 9.8)

A critical unauthenticated information disclosure vulnerability in SiYuan, the personal knowledge management system, allows remote attackers to retrieve document IDs via the readDir API and then read the full content of any document. Patched in version 3.6.2.

4 min read

CVE-2026-33875: Gematik Authenticator Authentication Flow Hijacking (CVSS 9.3)

A critical vulnerability in Gematik Authenticator prior to version 4.16.0 allows attackers to hijack authentication sessions via malicious deep links, potentially authenticating as victim users without their credentials.

5 min read

CVE-2026-33478: AVideo CloneSite Plugin Unauthenticated RCE (CVSS 10.0)

A critical chain of vulnerabilities in WWBN AVideo's CloneSite plugin allows fully unauthenticated attackers to achieve remote code execution via key...

4 min read
Back to all Security Alerts