CVE-2025-46350: Yeswiki Vulnerable to Authenticated Reflected Cross-site Scripting

3.5 CVSS

Description

YesWiki is a wiki system written in PHP. Prior to version 4.5.4, an attacker can use a reflected cross-site scripting attack to steal cookies from an authenticated user by having them click on a malicious link. Stolen cookies allow the attacker to take over the user’s session. This vulnerability may also allow attackers to deface the website or embed malicious content. This issue has been patched in version 4.5.4.

Classification

CVE ID: CVE-2025-46350

CVSS Base Severity: LOW

CVSS Base Score: 3.5

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N

Problem Types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Affected Products

Vendor: YesWiki

Product: yeswiki

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.03% (probability of being exploited)

EPSS Percentile: 6.3% (scored less or equal to compared to others)

EPSS Date: 2025-05-28 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-46350
https://github.com/YesWiki/yeswiki/security/advisories/GHSA-cg4f-cq8h-3ch8
https://github.com/YesWiki/yeswiki/commit/e2603176a4607b83659635a0c517550d4a171cb9

Timeline