CVE-2025-31131

YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. This vulnerability is fixed in 4.5.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:*

History

09 May 2025, 14:04

Type Values Removed Values Added
CPE cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:*
Summary
  • (es) YesWiki es un sistema wiki escrito en PHP. El parámetro squelette es vulnerable a ataques de Path Traversal, lo que permite el acceso de lectura a archivos arbitrarios en el servidor. Esta vulnerabilidad se corrigió en la versión 4.5.2.
References () https://github.com/YesWiki/yeswiki/commit/f78c915369a60c74ab8f38561ae93a4aaca9b989 - () https://github.com/YesWiki/yeswiki/commit/f78c915369a60c74ab8f38561ae93a4aaca9b989 - Patch
References () https://github.com/YesWiki/yeswiki/security/advisories/GHSA-w34w-fvp3-68xm - () https://github.com/YesWiki/yeswiki/security/advisories/GHSA-w34w-fvp3-68xm - Exploit, Vendor Advisory
First Time Yeswiki
Yeswiki yeswiki

01 Apr 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-01 15:16

Updated : 2025-05-09 14:04


NVD link : CVE-2025-31131

Mitre link : CVE-2025-31131

CVE.ORG link : CVE-2025-31131


JSON object : View

Products Affected

yeswiki

  • yeswiki
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')