Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases. In versions below 0.97.0, a brute-force protection bypass in the initial sync seed retrieval endpoint allows unauthenticated attackers to guess the login password without triggering rate limiting. Trilium is a single-user app without a username requirement, and brute-force protection bypass makes exploitation much more feasible. Multiple features provided by Trilium (e.g. MFA, share notes, custom request handler) indicate that Trilium can be exposed to the internet. This is fixed in version 0.97.0.
History

Tue, 05 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 05 Aug 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Trilium Project
Trilium Project trilium
Vendors & Products Trilium Project
Trilium Project trilium

Tue, 05 Aug 2025 00:45:00 +0000

Type Values Removed Values Added
Description Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases. In versions below 0.97.0, a brute-force protection bypass in the initial sync seed retrieval endpoint allows unauthenticated attackers to guess the login password without triggering rate limiting. Trilium is a single-user app without a username requirement, and brute-force protection bypass makes exploitation much more feasible. Multiple features provided by Trilium (e.g. MFA, share notes, custom request handler) indicate that Trilium can be exposed to the internet. This is fixed in version 0.97.0.
Title Trilium Notes is Vulnerable to Brute-force Protection Bypass via Initial Sync Seed Retrieval
Weaknesses CWE-307
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-08-05T00:14:33.857Z

Updated: 2025-08-05T13:55:55.320Z

Reserved: 2025-07-02T15:15:11.515Z

Link: CVE-2025-53544

cve-icon Vulnrichment

Updated: 2025-08-05T13:55:45.584Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-05T01:15:40.920

Modified: 2025-08-05T14:34:17.327

Link: CVE-2025-53544

cve-icon Redhat

No data.