<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Arbitrary-Document-Access — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/arbitrary-document-access/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 25 Mar 2026 19:37:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/arbitrary-document-access/feed.xml" rel="self" type="application/rss+xml"/><item><title>SiYuan Arbitrary Document Reading Vulnerability in Publishing Service</title><link>https://feed.craftedsignal.io/briefs/2026-06-siyuan-arbitrary-doc-read/</link><pubDate>Wed, 25 Mar 2026 19:37:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-siyuan-arbitrary-doc-read/</guid><description>SiYuan is vulnerable to arbitrary document reading via the publishing service, allowing attackers to retrieve document IDs and view the content of all documents, including encrypted or prohibited ones, by exploiting the `/api/file/readDir` and `/api/block/getChildBlocks` interfaces.</description><content:encoded><![CDATA[<p>SiYuan, a note-taking application, is susceptible to an arbitrary document reading vulnerability within its publishing service. This flaw allows an unauthenticated attacker to bypass access controls and retrieve the content of any document, regardless of encryption or access restrictions. The vulnerability stems from inadequate authorization checks when accessing document content through specific API endpoints. The issue was reported on March 25, 2026, and is tracked as CVE-2026-33669. The vulnerable package is <code>go/github.com/siyuan-note/siyuan/kernel</code>, specifically versions equal to or older than <code>0.0.0-20260317012524-fe4523fff2c8</code>. This vulnerability poses a significant risk to organizations and individuals using SiYuan for sensitive data storage, potentially leading to unauthorized access and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a SiYuan instance with the publishing service enabled.</li>
<li>The attacker sends a request to the <code>/api/file/readDir</code> endpoint to retrieve a list of document IDs. This endpoint lacks proper authorization checks.</li>
<li>The SiYuan server responds with a list of document IDs available within the publishing service.</li>
<li>The attacker selects a target document ID from the list obtained in the previous step.</li>
<li>The attacker sends a POST request to the <code>/api/block/getChildBlocks</code> endpoint, providing the target document ID in the request body. This endpoint is intended to retrieve child blocks of a specific document.</li>
<li>Due to insufficient access control, the server processes the request and returns the content of the requested document, even if it is encrypted or restricted.</li>
<li>The attacker parses the JSON response to extract the document content, which is typically formatted in Markdown.</li>
<li>The attacker can repeat steps 4-7 to obtain the content of other documents.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The arbitrary document reading vulnerability allows unauthorized access to potentially sensitive information stored within SiYuan. Successful exploitation could lead to the disclosure of confidential documents, intellectual property, personal data, or other restricted content. The impact is significant, as it bypasses intended security measures such as encryption and access controls. While specific victim numbers are unknown, any organization or individual utilizing the affected SiYuan version with the publishing service enabled is potentially at risk. The CVE is rated critical.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade SiYuan to a patched version that addresses CVE-2026-33669.</li>
<li>Deploy the Sigma rule &ldquo;SiYuan Arbitrary Document Access via getChildBlocks&rdquo; to detect potential exploitation attempts targeting the <code>/api/block/getChildBlocks</code> endpoint in your web server logs.</li>
<li>Monitor web server logs for suspicious activity, specifically POST requests to <code>/api/block/getChildBlocks</code> with unusual document IDs or request patterns.</li>
<li>Implement rate limiting on the <code>/api/file/readDir</code> and <code>/api/block/getChildBlocks</code> endpoints to mitigate potential abuse.</li>
<li>Enable webserver logging and ensure all SiYuan instances are monitored by the logging solution.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>siyuan</category><category>arbitrary-document-access</category><category>vulnerability</category><category>webserver</category></item></channel></rss>