Path Traversal Vulnerability in YesWiki PHP Wiki System
CVE-2025-31131
Key Information:
- Vendor
- Yeswiki
- Status
- Yeswiki
- Vendor
- CVE Published:
- 1 April 2025
Badges
What is CVE-2025-31131?
CVE-2025-31131 is a path traversal vulnerability in the YesWiki PHP Wiki System, which is designed to facilitate collaborative editing and knowledge sharing within organizations. This vulnerability exposes sensitive server files to unauthorized access by attackers, which can severely impact an organization’s integrity and confidentiality. By exploiting this flaw, malicious actors can read arbitrary files from the server, potentially accessing critical data or system configurations that can be exploited further.
Technical Details
The vulnerability arises from improper validations in the "squelette" parameter handling, allowing attackers to navigate outside the intended directories within the file system. This failure in input sanitization effectively enables path traversal attacks. The issue is present in versions prior to 4.5.2, where fixes have been implemented to mitigate this security risk.
Potential impact of CVE-2025-31131
-
Data Exposure: Attackers exploiting this vulnerability can gain unauthorized access to sensitive files, including configuration settings and user data, leading to privacy violations and possible data leaks.
-
Increased Attack Surface: The ability to read arbitrary files could allow attackers to gather intelligence on the system’s architecture and application logic, facilitating subsequent more sophisticated attacks or exploitation of other vulnerabilities.
-
Operational Disruption: Unauthorized access to critical system files can result in operational issues, ranging from denial-of-service scenarios to serious breaches that disrupt business continuity and compromise system integrity.
Affected Version(s)
yeswiki < 4.5.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
CVE-2025-31131 : YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable t
CVE-2025-31131 : YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on t
3 weeks ago
References
EPSS Score
26% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 📰
First article discovered by CVE Details
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved