CVE-2025-46549:
Yeswiki Vulnerable to Unauthenticated Reflected Cross-site Scripting
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.16283%
CWE
Published
4/29/2025
Updated
4/30/2025
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
yeswiki/yeswiki | composer | <= 4.5.3 | 4.5.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is a reflected XSS in the 'template' parameter. The provided commit 107d43056adebaa0c731230f9fd010898e88f3f5
shows a modification in the tools/bazar/actions/BazarListeAction.php
file, specifically within the formatArguments
method of the BazarListeAction
class. The patch introduces htmlspecialchars()
to sanitize the $template
variable, which is derived from user input ($_GET['template']
). This directly addresses the XSS vulnerability by ensuring that any HTML characters in the 'template' parameter are encoded, preventing script injection. Therefore, the BazarListeAction::formatArguments
function was the vulnerable function as it processed the unsanitized user input before the patch.