Vulnerability Description
Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases. In versions below 0.97.0, a brute-force protection bypass in the initial sync seed retrieval endpoint allows unauthenticated attackers to guess the login password without triggering rate limiting. Trilium is a single-user app without a username requirement, and brute-force protection bypass makes exploitation much more feasible. Multiple features provided by Trilium (e.g. MFA, share notes, custom request handler) indicate that Trilium can be exposed to the internet. This is fixed in version 0.97.0.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/TriliumNext/Trilium/pull/6243/commits/04c8f8a1234e8c9f4a87da1
- https://github.com/TriliumNext/Trilium/releases/tag/v0.97.0
- https://github.com/TriliumNext/Trilium/security/advisories/GHSA-hw5p-ff75-327r
- https://github.com/TriliumNext/Trilium/security/advisories/GHSA-hw5p-ff75-327r
FAQ
What is CVE-2025-53544?
CVE-2025-53544 is a vulnerability with a CVSS score of 7.5 (HIGH). Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases. In versions below 0.97.0, a brute-force protection bypass in...
How severe is CVE-2025-53544?
CVE-2025-53544 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-53544?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.