Cyber Posture

CVE-2026-33669

CriticalPublic PoC

Published: 26 March 2026

Published
26 March 2026
Modified
30 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 6.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33669 is a critical-severity Out-of-bounds Read (CWE-125) vulnerability in B3Log Siyuan. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 enforces approved authorizations for logical access, directly preventing unauthorized retrieval of document IDs and contents via the /api/file/readDir and /api/block/getChildBlocks endpoints.

prevent

AC-14 identifies and documents permitted actions without identification or authentication, restricting exposure of sensitive API endpoints like readDir and getChildBlocks to unauthenticated users.

prevent

SC-14 controls access to publicly accessible communications traffic, such as unauthenticated API endpoints, to block remote data exfiltration in SiYuan instances.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Vulnerability in exposed /api/file/readDir and /api/block/getChildBlocks endpoints directly enables T1190 (exploit public-facing app for unauth access), T1083 (file/dir discovery via readDir exposing doc IDs), and T1005 (collection of full document contents from local system).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

SiYuan is a personal knowledge management system. Prior to version 3.6.2, document IDs were retrieved via the /api/file/readDir interface, and then the /api/block/getChildBlocks interface was used to view the content of all documents. Version 3.6.2 patches the issue.

Deeper analysisAI

CVE-2026-33669 is a critical vulnerability in SiYuan, an open-source personal knowledge management system. Prior to version 3.6.2, the /api/file/readDir interface exposed document IDs, enabling attackers to chain this with the /api/block/getChildBlocks interface to retrieve the full content of all documents without authorization. This issue, classified under CWE-125 (Out-of-bounds Read), carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its high severity due to complete compromise potential across confidentiality, integrity, and availability.

Remote attackers require only network access to SiYuan instances, with no authentication, privileges, or user interaction needed. Exploitation allows unauthorized enumeration and exfiltration of all document contents, potentially exposing sensitive personal knowledge bases, notes, or data stored within the system.

The official GitHub Security Advisory (GHSA-34xj-66v3-6j83) confirms that SiYuan version 3.6.2 fully patches the vulnerability by addressing the improper access controls in the affected API endpoints. Security practitioners should immediately upgrade to version 3.6.2 or later and review exposed SiYuan deployments for potential prior exploitation.

Details

CWE(s)

Affected Products

b3log
siyuan
≤ 3.6.2

CVEs Like This One

CVE-2026-33670Same product: B3Log Siyuan
CVE-2026-23850Same product: B3Log Siyuan
CVE-2026-32938Same product: B3Log Siyuan
CVE-2026-33476Same product: B3Log Siyuan
CVE-2026-32815Same product: B3Log Siyuan
CVE-2026-30869Same product: B3Log Siyuan
CVE-2026-29073Same product: B3Log Siyuan
CVE-2026-34453Same product: B3Log Siyuan
CVE-2026-32110Same product: B3Log Siyuan
CVE-2026-25992Same product: B3Log Siyuan

References