CVE-2025-31131

YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. This vulnerability is fixed in 4.5.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:*

History

09 May 2025, 14:04

Type Values Removed Values Added
CPE cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:*
First Time Yeswiki
Yeswiki yeswiki
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://github.com/YesWiki/yeswiki/security/advisories/GHSA-w34w-fvp3-68xm - () https://github.com/YesWiki/yeswiki/security/advisories/GHSA-w34w-fvp3-68xm - Exploit, Vendor Advisory
References () https://github.com/YesWiki/yeswiki/commit/f78c915369a60c74ab8f38561ae93a4aaca9b989 - () https://github.com/YesWiki/yeswiki/commit/f78c915369a60c74ab8f38561ae93a4aaca9b989 - Patch

01 Apr 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-01 15:16

Updated : 2025-05-09 14:04


NVD link : CVE-2025-31131

Mitre link : CVE-2025-31131


JSON object : View

Products Affected

yeswiki

  • yeswiki
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')