CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-46347: YesWiki Remote Code Execution via Arbitrary PHP File Write and Execution

5.8 CVSS

Description

YesWiki is a wiki system written in PHP. Prior to version 4.5.4, YesWiki vulnerable to remote code execution. An arbitrary file write can be used to write a file with a PHP extension, which then can be browsed to in order to execute arbitrary code on the server, resulting in a full compromise of the server. This could potentially be performed unwittingly by a user. This issue has been patched in version 4.5.4.

Classification

CVE ID: CVE-2025-46347

CVSS Base Severity: MEDIUM

CVSS Base Score: 5.8

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:P

Problem Types

CWE-116: Improper Encoding or Escaping of Output

Affected Products

Vendor: YesWiki

Product: yeswiki

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.36% (probability of being exploited)

EPSS Percentile: 57.64% (scored less or equal to compared to others)

EPSS Date: 2025-05-28 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-46347
https://github.com/YesWiki/yeswiki/security/advisories/GHSA-88xg-v53p-fpvf
https://github.com/YesWiki/yeswiki/commit/8fe5275a78dc7e0f9c242baa3cbac6b5ac1cc066

Timeline