\n\n```\n3. Upload a file in current daily note:\n\n\n\n4. Open the file:\n\n- Right-click the uploaded asset in the note.\n- Select \"Export\"\n\n5. The JavaScript code executes immediately.\n\n\n\n### Impact\nThe vulnerability allows to upload an SVG file containing malicious scripts. When a user exports this file, the embedded arbitrary JavaScript code is executed within their browser context\n\n### Notes\nTested version: \n\n\n### Solution\n\nhttps://github.com/siyuan-note/siyuan/issues/16844","datePublished":"2026-01-27T00:17:33.877000","dateModified":"2026-01-27T02:11:59.842000","author":{"@type":"Organization","name":"Strobes Security","url":"https://strobes.co"},"publisher":{"@type":"Organization","name":"Strobes VI","url":"https://vi.strobes.co"},"mainEntityOfPage":{"@type":"WebPage","@id":"https://vi.strobes.co/cve/CVE-2026-23645"},"about":{"@type":"Thing","name":"CVE-2026-23645","description":"Security vulnerability CVE-2026-23645 with CVSS score 0"},"keywords":["CVE-2026-23645","CVE","vulnerability","security","low","patch available"]}\n\n```\n3. Upload a file in current daily note:\n\n\n\n4. Open the file:\n\n- Right-click the uploaded asset in the note.\n- Select \"Export\"\n\n5. The JavaScript code executes immediately.\n\n\n\n### Impact\nThe vulnerability allows to upload an SVG file containing malicious scripts. When a user exports this file, the embedded arbitrary JavaScript code is executed within their browser context\n\n### Notes\nTested version: \n\n\n### Solution\n\nhttps://github.com/siyuan-note/siyuan/issues/16844"}},{"@type":"Question","name":"What is the severity of CVE-2026-23645?","acceptedAnswer":{"@type":"Answer","text":"CVE-2026-23645 has a CVSS v3 score of 0, which is classified as Low severity."}},{"@type":"Question","name":"Is there an exploit available for CVE-2026-23645?","acceptedAnswer":{"@type":"Answer","text":"No known public exploits are currently available for CVE-2026-23645."}},{"@type":"Question","name":"Is there a patch available for CVE-2026-23645?","acceptedAnswer":{"@type":"Answer","text":"Yes, patches are available for CVE-2026-23645. Check the vendor advisories for update instructions."}}]}
CVE-2026-23645
Published: January 27, 2026
Last updated:
Exploit: NoZero-day: NoPatch: YesTrend: Neutral
TL;DR
CVE-2026-23645 is a low severity vulnerability with a CVSS score of 0.0. No known exploits currently, and patches are available.
Key Points
1Low severity (CVSS 0.0/10)
2No known public exploits
3Vendor patches are available
Severity Scores
CVSS v30.0
CVSS v20.0
Priority Score0.0
EPSS Score0.0
None
Exploitation LikelihoodMinimal
0.00%EPSS
Very low probability of exploitation
Monitor and patch as resources allow
0.00%
EPSS
0.0
CVSS
No
Exploit
Yes
Patch
Low Priority
no major risk factors
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
Description
Summary
A Stored Cross-Site Scripting (XSS) vulnerability exists in SiYuan Note. The application does not sanitize uploaded SVG files. If a user uploads and views a malicious SVG file (e.g., imported from an untrusted source), arbitrary JavaScript code is executed in the context of their authenticated session.
Details
The application allows authenticated users to upload files, including .svg images, without sanitizing the input to remove embedded JavaScript code (such as <script> tags or event handlers).
PoC
Create a new "Daily note" in the workspace.
<img width="1287" height="572" alt="image" src="https://github.com/user-attachments/assets/3a4389b9-695d-4e1b-94dc-72efdb047aa9" />
Create a file named test.svg with malicious JavaScript inside:
Upload a file in current daily note:
<img width="1617" height="316" alt="image" src="https://github.com/user-attachments/assets/6e14318a-08ec-48e5-b278-9174ad17cfcb" />
<img width="1482" height="739" alt="image" src="https://github.com/user-attachments/assets/95c996e8-5591-436a-9467-ab56c9ffbde0" />
<img width="1321" height="548" alt="image" src="https://github.com/user-attachments/assets/249fb187-3caa-4372-a9c9-56dfda6b8a8f" />
4. Open the file:
The vulnerability allows to upload an SVG file containing malicious scripts. When a user exports this file, the embedded arbitrary JavaScript code is executed within their browser context