Ad

CVE-2026-34598

HIGH CVSS 4.0: 7.1 EPSS 0.04%
Updated Apr 10, 2026
Yeswiki
Parameter Value
CVSS 7.1 (HIGH)
Affected Versions before 4.6.0
Fixed In 4.6.0
Type CWE-79 (Cross-Site Scripting (XSS)), CWE-87
Vendor Yeswiki
Public PoC No

YesWiki is a wiki system written in PHP. Prior to version 4.6.0, a stored and blind XSS vulnerability exists in the form title field. A malicious attacker can inject JavaScript without any authentication via a form title that is saved in the backend database.

When any user visits that injected page, the JavaScript payload gets executed. This issue has been patched in version 4.6.0.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
None
No privileges needed
User Interaction
Passive
Minimal interaction

Impact Assessment

Confidentiality
None
No data leak
Integrity
High
Complete data modification
Availability
None
No disruption

CVSS Vector v4.0

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Yeswiki Yeswiki
cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:*
4.6.0