Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases. In versions below 0.97.0, a brute-force protection bypass in the initial sync seed retrieval endpoint allows unauthenticated attackers to guess the login password without triggering rate limiting. Trilium is a single-user app without a username requirement, and brute-force protection bypass makes exploitation much more feasible. Multiple features provided by Trilium (e.g. MFA, share notes, custom request handler) indicate that Trilium can be exposed to the internet. This is fixed in version 0.97.0.
Metrics
Affected Vendors & Products
References
History
Tue, 05 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 05 Aug 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Trilium Project
Trilium Project trilium |
|
Vendors & Products |
Trilium Project
Trilium Project trilium |
Tue, 05 Aug 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases. In versions below 0.97.0, a brute-force protection bypass in the initial sync seed retrieval endpoint allows unauthenticated attackers to guess the login password without triggering rate limiting. Trilium is a single-user app without a username requirement, and brute-force protection bypass makes exploitation much more feasible. Multiple features provided by Trilium (e.g. MFA, share notes, custom request handler) indicate that Trilium can be exposed to the internet. This is fixed in version 0.97.0. | |
Title | Trilium Notes is Vulnerable to Brute-force Protection Bypass via Initial Sync Seed Retrieval | |
Weaknesses | CWE-307 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-05T00:14:33.857Z
Updated: 2025-08-05T13:55:55.320Z
Reserved: 2025-07-02T15:15:11.515Z
Link: CVE-2025-53544

Updated: 2025-08-05T13:55:45.584Z

Status : Awaiting Analysis
Published: 2025-08-05T01:15:40.920
Modified: 2025-08-05T14:34:17.327
Link: CVE-2025-53544

No data.