Cyber Posture

CVE-2026-30869

CriticalPublic PoC

Published: 10 March 2026

Published
10 March 2026
Modified
13 March 2026
KEV Added
Patch
CVSS Score 9.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L
EPSS Score 0.0021 42.8th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Description

SiYuan is a personal knowledge management system. Prior to 3.5.10, a path traversal vulnerability in the /export endpoint allows an attacker to read arbitrary files from the server filesystem. By exploiting double‑encoded traversal sequences, an attacker can access sensitive files…

more

such as conf/conf.json, which contains secrets including the API token, cookie signing key, and workspace access authentication code. Leaking these secrets may enable administrative access to the SiYuan kernel API, and in certain deployment scenarios could potentially be chained into remote code execution (RCE). This vulnerability is fixed in 3.5.10.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of inputs to the /export endpoint to block double-encoded path traversal sequences like '../', directly preventing arbitrary file reads.

prevent

Mandates timely flaw remediation by patching to SiYuan version 3.5.10, eliminating the vulnerable code in the /export endpoint.

detect

Enables monitoring for unauthorized disclosure of sensitive files such as conf/conf.json containing API tokens and secrets via crafted /export requests.

Security SummaryAI

CVE-2026-30869 is a path traversal vulnerability (CWE-22) affecting SiYuan, a personal knowledge management system, in versions prior to 3.5.10. The issue resides in the /export endpoint, which fails to properly sanitize inputs, allowing attackers to exploit double-encoded traversal sequences such as "../" to read arbitrary files from the server filesystem. This includes sensitive configuration files like conf/conf.json, which stores critical secrets such as the API token, cookie signing key, and workspace access authentication code. The vulnerability carries a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L), indicating high severity due to its network accessibility, low complexity, and lack of prerequisites.

Any unauthenticated remote attacker can exploit this vulnerability by sending crafted requests to the /export endpoint. Successful exploitation enables the disclosure of sensitive files and secrets, potentially granting administrative access to the SiYuan kernel API. In certain deployment configurations, these leaked credentials could be chained with other flaws to achieve remote code execution (RCE), amplifying the impact beyond mere information disclosure.

The vulnerability is fixed in SiYuan version 3.5.10, as detailed in the GitHub Security Advisory GHSA-2h2p-mvfx-868w. Security practitioners should upgrade to the patched version immediately and review access logs for exploitation attempts involving double-encoded path traversal payloads.

Details

CWE(s)

Affected Products

b3log
siyuan
≤ 3.5.10

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Path traversal in public-facing /export endpoint (T1190) enables arbitrary file reads from local filesystem (T1005), including config files with secrets like API tokens (T1552.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References