Vulnerability Description
SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, SiYuan desktop renders notification messages as raw HTML inside an Electron renderer. The notification route POST /api/notification/pushMsg accepts a user-controlled msg value, forwards it through the backend broadcast layer, and the frontend inserts it into the DOM with insertAdjacentHTML(...) at message.ts. On desktop builds, this is not limited to ordinary XSS. Electron windows are created with nodeIntegration: true, contextIsolation: false, and webSecurity: false at main.js. As a result, JavaScript executed from the notification sink can directly access Node APIs and escalate to desktop code execution. This vulnerability is fixed in 3.6.5.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/siyuan-note/siyuan/security/advisories/GHSA-grjj-6f6g-cq8q
- https://github.com/siyuan-note/siyuan/security/advisories/GHSA-grjj-6f6g-cq8q
FAQ
What is CVE-2026-41421?
CVE-2026-41421 is a vulnerability with a CVSS score of 8.8 (HIGH). SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, SiYuan desktop renders notification messages as raw HTML inside an Electron renderer. The notification route POST /api/no...
How severe is CVE-2026-41421?
CVE-2026-41421 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41421?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.