- Description
- YesWiki is a wiki system written in PHP. Prior to version 4.5.4, YesWiki is vulnerable to reflected XSS in the file upload form. This vulnerability allows any malicious unauthenticated user to create a link that can be clicked on by the victim to perform arbitrary actions. This issue has been patched in version 4.5.4.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
- security-advisories@github.com
- CWE-79
- Hype score
- Not currently trending
🚨 CVE-2025-46349 🔴 HIGH (7.6) 🏢 YesWiki - yeswiki 🏗️ < 4.5.4 🔗 https://t.co/kQfJQWkFQb 🔗 https://t.co/Lw8gOfC7n2 #CyberCron #VulnAlert #InfoSec https://t.co/DOggmhoQdm
@cybercronai
30 Apr 2025
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-46349 YesWiki is a wiki system written in PHP. Prior to version 4.5.4, YesWiki is vulnerable to reflected XSS in the file upload form. This vulnerability allows any malicio… https://t.co/yK2Zqha1E1
@CVEnew
29 Apr 2025
342 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E3230BE7-CB3C-401F-A727-7052E9E07A68",
"versionEndExcluding": "4.5.4"
}
],
"operator": "OR"
}
]
}
]