Miggo Logo

CVE-2025-31131:
Yeswiki Path Traversal vulnerability allows arbitrary read of files

8.6

CVSS Score
3.1

Basic Information

EPSS Score
0.93637%
Published
4/1/2025
Updated
4/1/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
yeswiki/yeswikicomposer< 4.5.24.5.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability exists in ThemeManager::loadTemplates where user-controlled parameters (theme/squelette/style) were used to construct filesystem paths without proper validation. The patch adds path sanitization checks and regex validation, confirming the original implementation was vulnerable. The function appears in stack traces when processing theme parameters and would be involved during exploitation as it handles the vulnerable 'squelette' input.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry T** `squ*l*tt*` p*r*m*t*r is vuln*r**l* to p*t* tr*v*rs*l *tt**ks, *n**lin* r*** ****ss to *r*itr*ry *il*s on t** s*rv*r. T** p*ylo** `../../../../../../*t*/p*ssw*` w*s su*mitt** in t** `squ*l*tt*` p*r*m*t*r. T** r*qu*st** *il* w*s r*turn

Reasoning

T** vuln*r**ility *xists in `T**m*M*n***r::lo**T*mpl*t*s` w**r* us*r-*ontroll** p*r*m*t*rs (`t**m*/squ*l*tt*/styl*`) w*r* us** to *onstru*t *il*syst*m p*t*s wit*out prop*r v*li**tion. T** p*t** ***s p*t* s*nitiz*tion ****ks *n* r***x v*li**tion, *on*