YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. This vulnerability is fixed in 4.5.2.
History

Fri, 09 May 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Yeswiki
Yeswiki yeswiki
CPEs cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:*
Vendors & Products Yeswiki
Yeswiki yeswiki

Tue, 01 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Description YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. This vulnerability is fixed in 4.5.2.
Title Path Traversal allowing arbitrary read of files in Yeswiki
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-04-01T14:56:45.222Z

Updated: 2025-04-01T16:11:20.111Z

Reserved: 2025-03-26T15:04:52.627Z

Link: CVE-2025-31131

cve-icon Vulnrichment

Updated: 2025-04-01T16:09:56.262Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-01T15:16:07.790

Modified: 2025-05-09T14:04:06.663

Link: CVE-2025-31131

cve-icon Redhat

No data.