CVE-2026-34605 in SiYuan
Zusammenfassung (Englisch)
SiYuan is a personal knowledge management system. From version 3.6.0 to before version 3.6.2, the SanitizeSVG function introduced in version 3.6.0 to fix XSS in the unauthenticated /api/icon/getDynamicIcon endpoint can be bypassed by using namespace-prefixed element names such as . The Go HTML5 parser records the element's tag as "x:script" rather than "script", so the tag check passes it through. The SVG is served with Content-Type: image/svg+xml and no Content Security Policy; when a browser opens the response directly, its XML parser resolves the prefix to the SVG namespace and executes the embedded script. This issue has been patched in version 3.6.2.
Zuständig
GitHub_M
Reservieren
30.03.2026
Veröffentlichung
01.04.2026
Einträge
VulDB provides additional information and datapoints for this CVE:
| ID | Schwachstelle | CWE | Aus | Mas | CVE |
|---|---|---|---|---|---|
| 354584 | SiYuan getDynamicIcon SanitizeSVG Cross Site Scripting | 79 | Nicht definiert | Offizieller Fix | CVE-2026-34605 |