Stored XSS in YesWiki Wiki System Allows Malicious Data Access
CVE-2025-24018

5.4MEDIUM

Key Information:

Vendor

Yeswiki

Status
Vendor
CVE Published:
21 January 2025

What is CVE-2025-24018?

YesWiki, a PHP-based wiki system, is vulnerable to a stored XSS attack in versions 4.4.5 and earlier. Authenticated users with rights to edit or comment can exploit the 'attach' component, which allows the upload and attachment of files to wiki pages. If a non-existent file is attached, the server improperly generates an upload button revealing the filename, which can be manipulated to execute malicious scripts. This vulnerability potentially allows attackers to compromise user accounts and modify content, as well as to exfiltrate sensitive user data, thereby affecting the integrity, availability, and confidentiality of the YesWiki instance. Users are advised to upgrade to version 4.5.0 or later, where this issue has been addressed.

Affected Version(s)

yeswiki < 4.5.0

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.