Описание
SiYuan is a personal knowledge management system. Versions prior to 3.5.4 are vulnerable to reflected cross-site scripting in /api/icon/getDynamicIcon due to unsanitized SVG input. The endpoint generates SVG images for text icons (type=8). The content query parameter is inserted directly into the SVG tag without XML escaping. Since the response Content-Type is image/svg+xml, injecting unescaped tags allows breaking the XML structure and executing JavaScript. Version 3.5.4 patches the issue.]
Ссылки
- Patch
- Issue TrackingPatch
- ExploitVendor AdvisoryPatch
Уязвимые конфигурации
Конфигурация 1Версия до 3.5.4 (исключая)
cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*
EPSS
Процентиль: 8%
0.00028
Низкий
6.1 Medium
CVSS3
Дефекты
CWE-79
Связанные уязвимости
CVSS3: 4.6
github
18 дней назад
SiYuan has a Reflected Cross-Site Scripting (XSS) via /api/icon/getDynamicIcon
EPSS
Процентиль: 8%
0.00028
Низкий
6.1 Medium
CVSS3
Дефекты
CWE-79