CVE-2025-46347

YesWiki is a wiki system written in PHP. Prior to version 4.5.4, YesWiki vulnerable to remote code execution. An arbitrary file write can be used to write a file with a PHP extension, which then can be browsed to in order to execute arbitrary code on the server, resulting in a full compromise of the server. This could potentially be performed unwittingly by a user. This issue has been patched in version 4.5.4.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:*

History

09 May 2025, 13:56

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:*
References () https://github.com/YesWiki/yeswiki/commit/8fe5275a78dc7e0f9c242baa3cbac6b5ac1cc066 - () https://github.com/YesWiki/yeswiki/commit/8fe5275a78dc7e0f9c242baa3cbac6b5ac1cc066 - Patch
References () https://github.com/YesWiki/yeswiki/security/advisories/GHSA-88xg-v53p-fpvf - () https://github.com/YesWiki/yeswiki/security/advisories/GHSA-88xg-v53p-fpvf - Exploit, Vendor Advisory
First Time Yeswiki
Yeswiki yeswiki

29 Apr 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-29 18:15

Updated : 2025-05-09 13:56


NVD link : CVE-2025-46347

Mitre link : CVE-2025-46347


JSON object : View

Products Affected

yeswiki

  • yeswiki
CWE

No CWE.