Cyber Posture

CVE-2026-34453

HighPublic PoC

Published: 31 March 2026

Published
31 March 2026
Modified
03 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0365 87.9th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34453 is a high-severity Incorrect Authorization (CWE-863) vulnerability in B3Log Siyuan. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 12.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-22 (Publicly Accessible Content) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 mandates enforcement of approved authorizations, directly addressing the incorrect authorization bypass where nil context skips password checks for protected documents.

prevent

AC-22 requires designation, review, and control of publicly accessible content, preventing exposure of bookmarked blocks from password-protected documents via the publish service.

prevent

SC-14 enforces security restrictions on publicly accessible system interfaces like the /api/bookmark/getBookmark endpoint, mitigating unauthenticated access to protected content.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an authorization bypass in a public-facing publish service endpoint, directly enabling remote exploitation of the application to access protected data without authentication.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

SiYuan is a personal knowledge management system. Prior to version 3.6.2, the publish service exposes bookmarked blocks from password-protected documents to unauthenticated visitors. In publish/read-only mode, /api/bookmark/getBookmark filters bookmark results by calling FilterBlocksByPublishAccess(nil, ...). Because the filter treats a nil…

more

context as authorized, it skips the publish password check and returns bookmarked blocks from documents configured as Protected. As a result, anyone who can access the publish service can retrieve content from protected documents without providing the required password, as long as at least one block in the document is bookmarked. This issue has been patched in version 3.6.2.

Deeper analysisAI

CVE-2026-34453 is a vulnerability in SiYuan, a personal knowledge management system, affecting versions prior to 3.6.2. The issue resides in the publish service, specifically the /api/bookmark/getBookmark endpoint in publish/read-only mode. This endpoint filters bookmark results using FilterBlocksByPublishAccess(nil, ...), where a nil context is treated as authorized, bypassing the publish password check for documents configured as Protected. As a result, bookmarked blocks from password-protected documents are exposed to unauthenticated visitors.

Attackers can exploit this vulnerability remotely over the network with low complexity, requiring no privileges, user interaction, or special setup, as indicated by its CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). Anyone able to access the publish service can retrieve sensitive content from protected documents without providing the required password, provided at least one block in the document is bookmarked. This leads to high confidentiality impact (CWE-863: Incorrect Authorization) but no integrity or availability disruption.

The vulnerability has been addressed in SiYuan version 3.6.2, as detailed in the project's release notes and security advisory (GHSA-c77m-r996-jr3q). Additional details are available in GitHub issue #17246, which reported the flaw. Security practitioners should upgrade to version 3.6.2 or later to mitigate exposure of protected content via the publish service.

Details

CWE(s)

Affected Products

b3log
siyuan
≤ 3.6.2

CVEs Like This One

CVE-2026-32767Same product: B3Log Siyuan
CVE-2026-33670Same product: B3Log Siyuan
CVE-2026-32749Same product: B3Log Siyuan
CVE-2026-32940Same product: B3Log Siyuan
CVE-2026-25992Same product: B3Log Siyuan
CVE-2026-32938Same product: B3Log Siyuan
CVE-2025-21609Same product: B3Log Siyuan
CVE-2026-40259Same product: B3Log Siyuan
CVE-2026-33476Same product: B3Log Siyuan
CVE-2026-23850Same product: B3Log Siyuan

References