- Description
- YesWiki is a wiki system written in PHP. Prior to version 4.5.4, the request to commence a site backup can be performed and downloaded without authentication. The archives are created with a predictable filename, so a malicious user could create and download an archive without being authenticated. This could result in a malicious attacker making numerous requests to create archives and fill up the file system, or by downloading the archive which contains sensitive site information. This issue has been patched in version 4.5.4.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- Hype score
- Not currently trending
🚨 CVE-2025-46348 ⚠️🔴 CRITICAL (10) 🏢 YesWiki - yeswiki 🏗️ < 4.5.4 🔗 https://t.co/FRAwNf69Pg 🔗 https://t.co/IDDf6ytzBc #CyberCron #VulnAlert #InfoSec https://t.co/QcparC4s8r
@cybercronai
30 Apr 2025
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-46348 YesWiki is a wiki system written in PHP. Prior to version 4.5.4, the request to commence a site backup can be performed and downloaded without authentication. The arc… https://t.co/NNXnmDww41
@CVEnew
29 Apr 2025
592 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-46348: CRITICAL] Vulnerable to cyber threats, YesWiki system pre-4.5.4 allowed unauthorized access to site backups without authentication, risking sensitive data exposure. Update to version 4.5.4 f...#cve,CVE-2025-46348,#cybersecurity https://t.co/hSC4adyRb1 https://t.c
@CveFindCom
29 Apr 2025
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E3230BE7-CB3C-401F-A727-7052E9E07A68",
"versionEndExcluding": "4.5.4"
}
],
"operator": "OR"
}
]
}
]