Miggo Logo

CVE-2025-46549:
Yeswiki Vulnerable to Unauthenticated Reflected Cross-site Scripting

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.16283%
Published
4/29/2025
Updated
4/30/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
yeswiki/yeswikicomposer<= 4.5.34.5.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is a reflected XSS in the 'template' parameter. The provided commit 107d43056adebaa0c731230f9fd010898e88f3f5 shows a modification in the tools/bazar/actions/BazarListeAction.php file, specifically within the formatArguments method of the BazarListeAction class. The patch introduces htmlspecialchars() to sanitize the $template variable, which is derived from user input ($_GET['template']). This directly addresses the XSS vulnerability by ensuring that any HTML characters in the 'template' parameter are encoded, preventing script injection. Therefore, the BazarListeAction::formatArguments function was the vulnerable function as it processed the unsanitized user input before the patch.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry **Vuln*r**l* V*rsion:** Y*swiki < v*.*.* ****t**ory:** Inj**tion ***W*: **:** Improp*r N*utr*liz*tion o* Input *urin* W** P*** **n*r*tion (*W*-**) ***VSS:** *.* (*VSS:*.*/*V:N/**:L/PR:N/UI:N/S:U/*:N/I:L/*:N) **Vuln*r**l* *n*point:** `/?*

Reasoning

T** vuln*r**ility is * r**l**t** XSS in t** 't*mpl*t*' p*r*m*t*r. T** provi*** *ommit `****************************************` s*ows * mo*i*i**tion in t** `tools/**z*r/**tions/**z*rList***tion.p*p` *il*, sp**i*i**lly wit*in t** `*orm*t*r*um*nts` m*