YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. This vulnerability is fixed in 4.5.2.
References
Link | Resource |
---|---|
https://github.com/YesWiki/yeswiki/commit/f78c915369a60c74ab8f38561ae93a4aaca9b989 | Patch |
https://github.com/YesWiki/yeswiki/security/advisories/GHSA-w34w-fvp3-68xm | Exploit Vendor Advisory |
Configurations
History
09 May 2025, 14:04
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://github.com/YesWiki/yeswiki/commit/f78c915369a60c74ab8f38561ae93a4aaca9b989 - Patch | |
References | () https://github.com/YesWiki/yeswiki/security/advisories/GHSA-w34w-fvp3-68xm - Exploit, Vendor Advisory | |
First Time |
Yeswiki
Yeswiki yeswiki |
01 Apr 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-01 15:16
Updated : 2025-05-09 14:04
NVD link : CVE-2025-31131
Mitre link : CVE-2025-31131
CVE.ORG link : CVE-2025-31131
JSON object : View
Products Affected
yeswiki
- yeswiki
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')