Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3525 | SiYuan has an arbitrary file read via /api/template/render |
Github GHSA |
GHSA-xx68-37v4-4596 | SiYuan has an arbitrary file read via /api/template/render |
Thu, 05 Jun 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
B3log
B3log siyuan |
|
| CPEs | cpe:2.3:a:b3log:siyuan:3.1.15:-:*:*:*:*:*:* | |
| Vendors & Products |
B3log
B3log siyuan |
|
| Metrics |
cvssV3_1
|
Thu, 12 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Dec 2024 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SiYuan is a personal knowledge management system. Prior to version 3.1.16, an arbitrary file read vulnerability exists in Siyuan's `/api/template/render` endpoint. The absence of proper validation on the path parameter allows attackers to access sensitive files on the host system. Version 3.1.16 contains a patch for the issue. | |
| Title | SiYuan has an arbitrary file read via /api/template/render | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-12-12T16:30:52.826Z
Reserved: 2024-12-10T14:48:24.296Z
Link: CVE-2024-55657
Updated: 2024-12-12T16:30:48.959Z
Status : Analyzed
Published: 2024-12-12T02:15:32.507
Modified: 2025-06-05T20:41:33.373
Link: CVE-2024-55657
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA