CVE-2026-33066

🔴 Łataj teraz

Brak sanitizacji HTML w SiYuan umożliwia atak XSS, co prowadzi do zdalnego wykonania kodu przez złośliwy skrypt w README.

CVSS
9.0
EPSS
0.2%
Exploit
poc
Vendor
b3log
Opis źródłowy (NVD)

SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the backend renderREADME function uses lute.New() without calling SetSanitize(true), allowing raw HTML embedded in Markdown to pass through unmodified. The frontend then assigns the rendered HTML to innerHTML without any additional sanitization. A malicious package author can embed arbitrary JavaScript in their README that executes when a user clicks to view the package details. Because SiYuan's Electron configuration enables nodeIntegration: true with contextIsolation: false, this XSS escalates directly to full Remote Code Execution. The issue was patched in version 3.6.1.

exploit rce xss Brak patcha
Źródła i daty
ŹródłoWartość
NVD – CVSS9.0
CISA KEV (aktywnie wykorzystywane)Nie
FIRST EPSS (prawdopodobieństwo exploita)0.2%
Opublikowano (NVD)2026-03-20 09:16:14 UTC
Ostatnia modyfikacja (NVD)2026-03-23 15:31:10 UTC
Referencje