Stored XSS in YesWiki Wiki System Allows Malicious Data Access
CVE-2025-24018
Key Information:
- Vendor
- Yeswiki
- Status
- Yeswiki
- Vendor
- CVE Published:
- 21 January 2025
Summary
YesWiki, a PHP-based wiki system, is vulnerable to a stored XSS attack in versions 4.4.5 and earlier. Authenticated users with rights to edit or comment can exploit the 'attach' component, which allows the upload and attachment of files to wiki pages. If a non-existent file is attached, the server improperly generates an upload button revealing the filename, which can be manipulated to execute malicious scripts. This vulnerability potentially allows attackers to compromise user accounts and modify content, as well as to exfiltrate sensitive user data, thereby affecting the integrity, availability, and confidentiality of the YesWiki instance. Users are advised to upgrade to version 4.5.0 or later, where this issue has been addressed.
Affected Version(s)
yeswiki < 4.5.0
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved