CVE-2025-7887

A vulnerability has been found in Zavy86 WikiDocs up to 1.0.78 and classified as problematic. This vulnerability affects unknown code of the file template.inc.php. The manipulation of the argument path leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/Zavy86/WikiDocs/issues/256 Exploit Issue Tracking Third Party Advisory
https://github.com/Zavy86/WikiDocs/issues/256#issue-3201516458 Exploit Issue Tracking Third Party Advisory
https://github.com/Zavy86/WikiDocs/issues/256#issuecomment-3034714777 Exploit Issue Tracking
https://vuldb.com/?ctiid.317002 Permissions Required VDB Entry
https://vuldb.com/?id.317002 Third Party Advisory VDB Entry
https://vuldb.com/?submit.609063 Exploit Third Party Advisory VDB Entry
https://github.com/Zavy86/WikiDocs/issues/256 Exploit Issue Tracking Third Party Advisory
https://github.com/Zavy86/WikiDocs/issues/256#issue-3201516458 Exploit Issue Tracking Third Party Advisory
https://github.com/Zavy86/WikiDocs/issues/256#issuecomment-3034714777 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:wikidocs:wikidocs:*:*:*:*:*:*:*:*

History

15 Sep 2025, 18:40

Type Values Removed Values Added
References () https://github.com/Zavy86/WikiDocs/issues/256 - () https://github.com/Zavy86/WikiDocs/issues/256 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/Zavy86/WikiDocs/issues/256#issue-3201516458 - () https://github.com/Zavy86/WikiDocs/issues/256#issue-3201516458 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/Zavy86/WikiDocs/issues/256#issuecomment-3034714777 - () https://github.com/Zavy86/WikiDocs/issues/256#issuecomment-3034714777 - Exploit, Issue Tracking
References () https://vuldb.com/?ctiid.317002 - () https://vuldb.com/?ctiid.317002 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.317002 - () https://vuldb.com/?id.317002 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.609063 - () https://vuldb.com/?submit.609063 - Exploit, Third Party Advisory, VDB Entry
First Time Wikidocs
Wikidocs wikidocs
CPE cpe:2.3:a:wikidocs:wikidocs:*:*:*:*:*:*:*:*

22 Jul 2025, 13:06

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en Zavy86 WikiDocs hasta la versión 1.0.78, clasificada como problemática. Esta vulnerabilidad afecta al código desconocido del archivo template.inc.php. La manipulación de la ruta de argumentos provoca ataques de Cross-Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.

21 Jul 2025, 14:15

Type Values Removed Values Added
References () https://github.com/Zavy86/WikiDocs/issues/256 - () https://github.com/Zavy86/WikiDocs/issues/256 -
References () https://github.com/Zavy86/WikiDocs/issues/256#issue-3201516458 - () https://github.com/Zavy86/WikiDocs/issues/256#issue-3201516458 -
References () https://github.com/Zavy86/WikiDocs/issues/256#issuecomment-3034714777 - () https://github.com/Zavy86/WikiDocs/issues/256#issuecomment-3034714777 -

20 Jul 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-20 12:15

Updated : 2025-09-15 18:40


NVD link : CVE-2025-7887

Mitre link : CVE-2025-7887

CVE.ORG link : CVE-2025-7887


JSON object : View

Products Affected

wikidocs

  • wikidocs
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')