S4E Mobile Logo

CVE-2025-46349 Scanner

CVE-2025-46349 Scanner - Cross-Site Scripting (XSS) vulnerability in YesWiki

Short Info


Level

Medium

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

25 days 11 hours

Scan only one

URL

Toolbox

YesWiki is an open-source wiki system that is used for creating collaborative content environments. It is primarily utilized by organizations, teams, and educators to facilitate content sharing and collaborative workspaces. YesWiki allows users to create, edit, and manage content in a structured format while supporting various multimedia content forms. It is easy to install and extend, making it a popular choice for small to medium-sized collaborative projects. The platform is known for its simplicity and support of community-driven plugin enhancements, allowing adaptability for various use cases. Its capabilities include document management, group collaboration, and streamlined sharing of information.

Cross-Site Scripting (XSS) is a type of vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. This vulnerability typically occurs when an application fails to validate or escape user input before incorporating it into the webpage's content. In the context of YesWiki, this reflected XSS vulnerability is linked to the file upload form, where malicious scripts can be executed. If a user clicks on a crafted link, it can lead to the execution of code that can compromise visitor interactions. XSS vulnerabilities are critical in that they can facilitate unauthorized actions in sessions initiated by unwary users.

The specific vulnerability involves the ability to upload a file or form input that includes a malicious script. The script can be triggered when a user visits a particular crafted URL, leading to execution within the context of the vulnerable website. The vulnerability involves the endpoint handling file uploads and does not sufficiently sanitize input data. The reflected script used in this vulnerability executes within the Upload form context, as confirmed by testing with crafted payloads. This vulnerability requires user interaction, specifically a click on the malicious URL, affirming the XSS nature.

When exploited, this vulnerability can allow attackers to perform actions on behalf of an authenticated user, such as stealing session cookies, redirecting to phishing sites, or modifying the content displayed to the user. In some cases, it may lead to further compromise of user accounts or unauthorized actions being executed. Those actions would result in loss of user account confidentiality and integrity on the YesWiki installation, leading to trust erosion in affected websites. Furthermore, compromised installations could serve as a pivot point for further attacks within network environments.

REFERENCES

Get started to protecting your digital assets