CVE-2026-23645

The Note That Took Notes on You: Bypassing SiYuan's SVG Sanitization

Alon Barad
Alon Barad
Software Engineer

Jan 16, 2026·5 min read·0 visits

Executive Summary (TL;DR)

SiYuan Note < 3.5.4-dev2 allows Stored XSS via malicious SVG files. The application serves SVGs as `image/svg+xml`, allowing embedded JS to execute. The vendor's patch only strips `<script>` tags, meaning exploits using `onload` or `onerror` still work. This is a textbook example of why 'sanitization via deletion' fails.

SiYuan Note, a privacy-focused 'local-first' knowledge management tool, inadvertently turned user notes into a playground for JavaScript execution. By allowing raw SVG uploads without proper sanitization, the application enabled Stored XSS. Even more interestingly, the initial patch attempted to fix this by simply deleting `<script>` tags—a classic 'whack-a-mole' mistake that leaves the door wide open for event-handler-based exploits.

Fix Analysis (1)

Technical Appendix

CVSS Score
5.3/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

Affected Systems

SiYuan Note < 3.5.4-dev2

Affected Versions Detail

Product
Affected Versions
Fixed Version
SiYuan Note
SiYuan
< 3.5.4-dev23.5.4-dev2
AttributeDetail
CWE IDCWE-79
Attack VectorNetwork
CVSS v4.05.3 (Medium)
ImpactSession Hijacking / Data Exfiltration
Exploit StatusPOC Available
Patch StatusPartial / Incomplete
CWE-79
Cross-site Scripting

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Vulnerability Timeline

Vulnerability Published
2026-01-16
Patch Released (v3.5.4-dev2)
2026-01-16
Researcher Analysis identifies patch bypass
2026-01-16

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.