YesWiki is a wiki system written in PHP. Prior to version 4.5.4, the `/?BazaR` endpoint and `idformulaire` parameter are vulnerable to cross-site scripting. An attacker can use a reflected cross-site scripting attack to steal cookies from an authenticated user by having them click on a malicious link. Stolen cookies allow the attacker to take over the user’s session. This vulnerability may also allow attackers to deface the website or embed malicious content. This issue has been patched in version 4.5.4.
Metrics
Affected Vendors & Products
References
History
Fri, 09 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Yeswiki
Yeswiki yeswiki |
|
CPEs | cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:* | |
Vendors & Products |
Yeswiki
Yeswiki yeswiki |
Wed, 30 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 29 Apr 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | YesWiki is a wiki system written in PHP. Prior to version 4.5.4, the `/?BazaR` endpoint and `idformulaire` parameter are vulnerable to cross-site scripting. An attacker can use a reflected cross-site scripting attack to steal cookies from an authenticated user by having them click on a malicious link. Stolen cookies allow the attacker to take over the user’s session. This vulnerability may also allow attackers to deface the website or embed malicious content. This issue has been patched in version 4.5.4. | |
Title | Yeswiki Vulnerable to Unauthenticated Reflected Cross-site Scripting | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-30T13:18:28.094Z
Reserved: 2025-04-24T21:10:48.173Z
Link: CVE-2025-46550

Updated: 2025-04-30T13:18:18.255Z

Status : Analyzed
Published: 2025-04-29T21:15:52.467
Modified: 2025-05-09T13:59:35.920
Link: CVE-2025-46550

No data.