{"id":78647,"date":"2026-05-20T03:46:37","date_gmt":"2026-05-20T00:16:37","guid":{"rendered":"https:\/\/afaghhosting.net\/blog\/cve-2026-35593-trilium-notes-has-local-file-inclusion-via-upload-modified-file-api-endpoint\/"},"modified":"2026-05-20T03:46:37","modified_gmt":"2026-05-20T00:16:37","slug":"cve-2026-35593-trilium-notes-has-local-file-inclusion-via-upload-modified-file-api-endpoint","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2026-35593-trilium-notes-has-local-file-inclusion-via-upload-modified-file-api-endpoint\/","title":{"rendered":"CVE-2026-35593 &#8211; Trilium Notes has Local File Inclusion via upload modified file API endpoint"},"content":{"rendered":"<p>CVE ID :CVE-2026-35593<\/p>\n<p>  Published : May 20, 2026, 12:16 a.m. | 43\u00a0minutes ago<\/p>\n<p>  Description :Trilium Notes is an open-source, cross-platform hierarchical note taking application for building large personal knowledge bases. Versions 0.102.1 and prior are vulnerable to Local File Inclusion, allowing an authenticated attacker to read sensitive arbitrary files from the server&#8217;s filesystem. The uploadModifiedFileToAttachment function, which is called when a POST request is received to \/api\/attachments\/{attachmentId}\/upload-modified-file, replaces the content of the attachment with the content from another file (whose path is provided in filePath of Request body). After which the content of the attachment can be viewed at \/api\/attachments\/{attachmentId}\/download. This exposes sensitive system files such as SSH keys, credentials, configs, and OS files, potentially leading to remote code execution and compromise of co-hosted applications. This issue has been fixed in version 0.102.2.<\/p>\n<p>  Severity: 6.8 | MEDIUM<\/p>\n<p>  Visit the link for more details, such as CVSS details, affected products, timeline, and more&#8230;\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE ID :CVE-2026-35593 Published : May 20, 2026, 12:16 a.m. | 43\u00a0minutes ago Description :Trilium Notes is an open-source, cross-platform hierarchical note taking application for building large personal knowledge bases. Versions 0.102.1 and prior are vulnerable to Local File Inclusion, allowing an authenticated attacker to read sensitive arbitrary files from the server&#8217;s filesystem. The uploadModifiedFileToAttachment &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-78647","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=78647"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78647\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=78647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=78647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=78647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}