SiYuan Path Traversal: Arbitrary File Deletion Exposes Core Configuration

SiYuan Path Traversal: Arbitrary File Deletion Exposes Core Configuration

The National Vulnerability Database has disclosed CVE-2026-40318, a critical path traversal vulnerability in SiYuan, an open-source personal knowledge management system. Affecting versions 3.6.3 and prior, this flaw allows authenticated attackers to delete arbitrary .json files on the server, including global configuration and workspace metadata. With a CVSS score of 8.5 (HIGH), this isn’t just a minor annoyance; it’s a direct route to system instability and data loss.

The core issue lies within the /api/av/removeUnusedAttributeView endpoint. As the National Vulnerability Database details, this endpoint constructs a filesystem path using the id parameter, which is user-controlled. Crucially, there’s no validation or path boundary enforcement. This means an attacker can inject path traversal sequences like ../ into the id value, effectively escaping the intended directory.

From an attacker’s perspective, this is a goldmine. Deleting configuration files isn’t about data exfiltration; it’s about denial of service and system sabotage. Imagine taking down an organization’s entire knowledge base or corrupting critical operational settings simply by deleting a few key .json files. This can halt operations, force extensive recovery efforts, and potentially lead to data integrity issues if backups are not robust or recent.

While the CVSS vector AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H indicates low privileges are needed and no user interaction, the impact on availability (A:H) is severe. The C:N (no confidentiality impact) and I:L (low integrity impact) might seem reassuring, but don’t be fooled. Corrupting configuration is an integrity impact, even if it’s not data modification in the traditional sense. It’s about breaking the system’s operational integrity.

For defenders, this is a stark reminder of the dangers of unchecked user input. Any endpoint that interacts with the filesystem, especially when constructing paths based on client-supplied data, must implement stringent validation and canonicalization. Input sanitization is not optional; it’s foundational security. This isn’t a complex exploit; it’s a classic path traversal, and its persistence in applications underscores a fundamental failing in secure development practices.

CISOs need to emphasize secure coding practices, particularly around file operations and input validation. Automated static and dynamic analysis tools should flag these types of vulnerabilities immediately. Furthermore, organizations using SiYuan should prioritize patching to version 3.6.4 or later. If immediate patching isn’t possible, consider network-level restrictions or WAF rules to block path traversal sequences in relevant API endpoints as a temporary mitigation, though this is a bandage, not a fix.

What This Means For You

  • If your organization uses SiYuan, **you are exposed to arbitrary file deletion**. Immediately verify your SiYuan version. If it's 3.6.3 or prior, **patch to version 3.6.4 or later NOW**. Audit your SiYuan server logs for any unusual file deletion attempts or API calls to `/api/av/removeUnusedAttributeView` with suspicious `id` parameters. This vulnerability can lead to critical system outages.

Related ATT&CK Techniques

🛡️ Detection Rules

4 rules · 6 SIEM formats

4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.

medium T1071.001 Command and Control

C2 Beacon Detection — HTTP to Suspicious Domain

Sigma YAML — free preview
✓ Sigma 🔒 Splunk SPL 🔒 Sentinel KQL 🔒 Elastic 🔒 QRadar AQL 🔒 Wazuh

Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.

4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get All SIEM Formats →

Indicators of Compromise

IDTypeIndicator
CVE-2026-40318 Path Traversal SiYuan versions 3.6.3 and prior
CVE-2026-40318 Path Traversal Vulnerable endpoint: /api/av/removeUnusedAttributeView
CVE-2026-40318 Path Traversal Vulnerable parameter: id (user-controlled, used in filesystem path)
CVE-2026-40318 Path Traversal Impact: Deletion of arbitrary .json files

Related Posts

CVE-2026-40265 — Note Mark is an open-source note-taking application. In

CVE-2026-40265 — Note Mark is an open-source note-taking application. In versions 0.19.1 and prior, the asset download endpoint at /api/notes/{noteID}/assets/{assetID} is registered without authentication middleware,...

vulnerabilityCVEmedium-severitycwe-862
/SCW Vulnerability Desk /MEDIUM /⚑ 2 IOCs

Note Mark XSS: Magic Bytes Fail, Sessions Exposed

CVE-2026-40262 — Note Mark is an open-source note-taking application. In versions 0.19.1 and prior, the asset delivery handler serves uploaded files inline and relies on...

vulnerabilityCVEhigh-severitycwe-79cwe-434
/SCW Vulnerability Desk /HIGH /⚑ 4 IOCs

Cloud Foundry UAA Bypass: Unsigned SAML Exposes Identity Tokens

CVE-2026-22734 — Cloud Foundry UUA is vulnerable to a bypass that allows an attacker to obtain a token for any user and gain access to UAA-protected...

vulnerabilityCVEhigh-severitycwe-290
/SCW Vulnerability Desk /HIGH /⚑ 4 IOCs