YesWiki is a wiki system written in PHP. Prior to version 4.5.4, the `/?BazaR` endpoint and `idformulaire` parameter are vulnerable to cross-site scripting. An attacker can use a reflected cross-site scripting attack to steal cookies from an authenticated user by having them click on a malicious link. Stolen cookies allow the attacker to take over the user’s session. This vulnerability may also allow attackers to deface the website or embed malicious content. This issue has been patched in version 4.5.4.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Apr 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | YesWiki is a wiki system written in PHP. Prior to version 4.5.4, the `/?BazaR` endpoint and `idformulaire` parameter are vulnerable to cross-site scripting. An attacker can use a reflected cross-site scripting attack to steal cookies from an authenticated user by having them click on a malicious link. Stolen cookies allow the attacker to take over the user’s session. This vulnerability may also allow attackers to deface the website or embed malicious content. This issue has been patched in version 4.5.4. | |
Title | Yeswiki Vulnerable to Unauthenticated Reflected Cross-site Scripting | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-04-29T20:41:01.879Z
Updated: 2025-04-30T13:18:28.094Z
Reserved: 2025-04-24T21:10:48.173Z
Link: CVE-2025-46550

No data.

Status : Received
Published: 2025-04-29T21:15:52.467
Modified: 2025-04-30T14:15:30.170
Link: CVE-2025-46550

No data.