Ad

CVE-2025-24018

MEDIUM CVSS 3.1: 5.4 EPSS 0.20%
Updated May 09, 2025
Yeswiki
Parameter Value
CVSS 5.4 (MEDIUM)
Affected Versions before 4.5.0
Fixed In 4.5.0
Type CWE-79 (Cross-Site Scripting (XSS))
Vendor Yeswiki
Public PoC No

YesWiki is a wiki system written in PHP. In versions up to and including 4.4.5, it is possible for an authenticated user with rights to edit/create a page or comment to trigger a stored XSS which will be reflected on any page where the resource is loaded. The vulnerability makes use of the content edition feature and more specifically of the `{{attach}}` component allowing users to attach files/medias to a page.

When a file is attached using the `{{attach}}` component, if the resource contained in the `file` attribute doesn't exist, then the server will generate a file upload button containing the filename. This vulnerability allows any malicious authenticated user that has the right to create a comment or edit a page to be able to steal accounts and therefore modify pages, comments, permissions, extract user data (emails), thus impacting the integrity, availability and confidentiality of a YesWiki instance. Version 4.5.0 contains a patch for the issue.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
Low
Partial data leak
Integrity
Low
Partial data modification
Availability
None
No disruption

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Yeswiki Yeswiki
cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:*
4.5.0