CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-31131: Path Traversal allowing arbitrary read of files in Yeswiki

8.6 CVSS

Description

YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. This vulnerability is fixed in 4.5.2.

Classification

CVE ID: CVE-2025-31131

CVSS Base Severity: HIGH

CVSS Base Score: 8.6

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Problem Types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Affected Products

Vendor: YesWiki

Product: yeswiki

Nuclei Template

http/cves/2025/CVE-2025-31131.yaml

Exploit Prediction Scoring System (EPSS)

EPSS Score: 26.41% (probability of being exploited)

EPSS Percentile: 95.98% (scored less or equal to compared to others)

EPSS Date: 2025-04-30 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-31131
https://github.com/YesWiki/yeswiki/security/advisories/GHSA-w34w-fvp3-68xm
https://github.com/YesWiki/yeswiki/commit/f78c915369a60c74ab8f38561ae93a4aaca9b989

Timeline