Stored Cross-Site Scripting Vulnerability in YesWiki Comments Feature
CVE-2025-46346

6.3MEDIUM

Key Information:

Vendor

Yeswiki

Status
Vendor
CVE Published:
29 April 2025

What is CVE-2025-46346?

YesWiki, a PHP-based wiki system, contains a stored cross-site scripting vulnerability in its comments feature. This flaw allows attackers to inject malicious JavaScript payloads that are stored and executed whenever a user views the affected comment. The vulnerability arises from improper sanitization and encoding of user input, specifically failing to account for obfuscated script payloads using JavaScript block comments. This significant security issue has been remedied in version 4.5.4, emphasizing the importance of regular updates for application security.

Affected Version(s)

yeswiki < 4.5.4

References

CVSS V4

Score:
6.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.