YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. This vulnerability is fixed in 4.5.2.
References
| Link | Resource |
|---|---|
| https://github.com/YesWiki/yeswiki/commit/f78c915369a60c74ab8f38561ae93a4aaca9b989 | Patch |
| https://github.com/YesWiki/yeswiki/security/advisories/GHSA-w34w-fvp3-68xm | Exploit Vendor Advisory |
Configurations
History
09 May 2025, 14:04
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/YesWiki/yeswiki/commit/f78c915369a60c74ab8f38561ae93a4aaca9b989 - Patch | |
| References | () https://github.com/YesWiki/yeswiki/security/advisories/GHSA-w34w-fvp3-68xm - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:* | |
| Summary |
|
|
| First Time |
Yeswiki
Yeswiki yeswiki |
01 Apr 2025, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-04-01 15:16
Updated : 2025-05-09 14:04
NVD link : CVE-2025-31131
Mitre link : CVE-2025-31131
CVE.ORG link : CVE-2025-31131
JSON object : View
Products Affected
yeswiki
- yeswiki
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
