CVE-2026-34605 in SiYuaninfo

Zusammenfassung (Englisch)

SiYuan is a personal knowledge management system. From version 3.6.0 to before version 3.6.2, the SanitizeSVG function introduced in version 3.6.0 to fix XSS in the unauthenticated /api/icon/getDynamicIcon endpoint can be bypassed by using namespace-prefixed element names such as . The Go HTML5 parser records the element's tag as "x:script" rather than "script", so the tag check passes it through. The SVG is served with Content-Type: image/svg+xml and no Content Security Policy; when a browser opens the response directly, its XML parser resolves the prefix to the SVG namespace and executes the embedded script. This issue has been patched in version 3.6.2.

Zuständig

GitHub_M

Reservieren

30.03.2026

Veröffentlichung

01.04.2026

Einträge

VulDB provides additional information and datapoints for this CVE:

Do you need the next level of professionalism?

Upgrade your account now!