CVE-2025-46346: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in YesWiki yeswiki
YesWiki is a wiki system written in PHP. Prior to version 4.5.4, a stored cross-site scripting (XSS) vulnerability was discovered in the application’s comments feature. This issue allows a malicious actor to inject JavaScript payloads that are stored and later executed in the browser of any user viewing the affected comment. The XSS occurs because the application fails to properly sanitize or encode user input submitted to the comments. Notably, the application sanitizes or does not allow execution of `<script>` tags, but does not account for payloads obfuscated using JavaScript block comments like `/* JavaScriptPayload */`. This issue has been patched in version 4.5.4.
AI Analysis
Technical Summary
CVE-2025-46346 is a stored cross-site scripting (XSS) vulnerability affecting versions of YesWiki prior to 4.5.4. YesWiki is a PHP-based wiki system that allows collaborative content creation and editing. The vulnerability resides in the comments feature, where user input is not properly sanitized or encoded before being rendered on web pages. Although the application blocks direct <script> tags, it fails to neutralize JavaScript payloads obfuscated using block comments (e.g., /* JavaScriptPayload */). This flaw enables an attacker to inject malicious JavaScript code into comments, which is then stored on the server and executed in the browsers of any users who view the affected comments. The vulnerability does not require authentication and can be exploited remotely with low complexity, as no special privileges or user interaction beyond viewing the comment are needed. The CVSS 4.0 score is 6.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction (viewing the comment). The impact is primarily on confidentiality and integrity, as the attacker can execute arbitrary scripts in the context of the victim’s browser, potentially stealing session cookies, performing actions on behalf of the user, or redirecting to malicious sites. Availability impact is minimal. The issue has been patched in YesWiki version 4.5.4, which properly sanitizes and encodes user input to prevent execution of obfuscated JavaScript payloads. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations using YesWiki versions prior to 4.5.4, this vulnerability poses a significant risk to user data confidentiality and integrity. Attackers could leverage the stored XSS to hijack user sessions, steal sensitive information, or perform unauthorized actions within the wiki environment. This is particularly concerning for organizations relying on YesWiki for internal documentation, knowledge sharing, or collaborative projects, where sensitive or proprietary information may be exposed. Additionally, the vulnerability could be used as a foothold for further attacks, such as phishing or malware distribution, by injecting malicious scripts that redirect users or load external payloads. The lack of authentication requirements and the ability to exploit remotely increase the threat surface. However, the impact on system availability is limited. Organizations with public-facing YesWiki instances are at higher risk, as any visitor could trigger the malicious payload. Internal deployments with restricted access reduce exposure but do not eliminate risk if internal users can be targeted. Overall, the vulnerability could undermine trust in the wiki platform and lead to data breaches or operational disruptions if exploited.
Mitigation Recommendations
1. Immediate upgrade to YesWiki version 4.5.4 or later, where the vulnerability is patched. 2. If upgrading is not immediately possible, implement web application firewall (WAF) rules to detect and block suspicious comment inputs containing JavaScript block comment patterns or other obfuscated script payloads. 3. Conduct a thorough audit of existing comments to identify and remove potentially malicious scripts, especially those using obfuscated JavaScript techniques. 4. Enforce strict Content Security Policy (CSP) headers to restrict the execution of inline scripts and loading of external scripts, mitigating the impact of any injected payloads. 5. Educate users and administrators about the risks of XSS and encourage cautious behavior when interacting with user-generated content. 6. Monitor logs and user reports for signs of exploitation attempts or unusual behavior related to the wiki platform. 7. Review and enhance input validation and output encoding practices beyond the vendor patch, ensuring all user inputs are sanitized according to OWASP guidelines. 8. Consider isolating the wiki environment or limiting access to trusted users to reduce exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium, Poland, Finland
CVE-2025-46346: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in YesWiki yeswiki
Description
YesWiki is a wiki system written in PHP. Prior to version 4.5.4, a stored cross-site scripting (XSS) vulnerability was discovered in the application’s comments feature. This issue allows a malicious actor to inject JavaScript payloads that are stored and later executed in the browser of any user viewing the affected comment. The XSS occurs because the application fails to properly sanitize or encode user input submitted to the comments. Notably, the application sanitizes or does not allow execution of `<script>` tags, but does not account for payloads obfuscated using JavaScript block comments like `/* JavaScriptPayload */`. This issue has been patched in version 4.5.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-46346 is a stored cross-site scripting (XSS) vulnerability affecting versions of YesWiki prior to 4.5.4. YesWiki is a PHP-based wiki system that allows collaborative content creation and editing. The vulnerability resides in the comments feature, where user input is not properly sanitized or encoded before being rendered on web pages. Although the application blocks direct <script> tags, it fails to neutralize JavaScript payloads obfuscated using block comments (e.g., /* JavaScriptPayload */). This flaw enables an attacker to inject malicious JavaScript code into comments, which is then stored on the server and executed in the browsers of any users who view the affected comments. The vulnerability does not require authentication and can be exploited remotely with low complexity, as no special privileges or user interaction beyond viewing the comment are needed. The CVSS 4.0 score is 6.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction (viewing the comment). The impact is primarily on confidentiality and integrity, as the attacker can execute arbitrary scripts in the context of the victim’s browser, potentially stealing session cookies, performing actions on behalf of the user, or redirecting to malicious sites. Availability impact is minimal. The issue has been patched in YesWiki version 4.5.4, which properly sanitizes and encodes user input to prevent execution of obfuscated JavaScript payloads. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations using YesWiki versions prior to 4.5.4, this vulnerability poses a significant risk to user data confidentiality and integrity. Attackers could leverage the stored XSS to hijack user sessions, steal sensitive information, or perform unauthorized actions within the wiki environment. This is particularly concerning for organizations relying on YesWiki for internal documentation, knowledge sharing, or collaborative projects, where sensitive or proprietary information may be exposed. Additionally, the vulnerability could be used as a foothold for further attacks, such as phishing or malware distribution, by injecting malicious scripts that redirect users or load external payloads. The lack of authentication requirements and the ability to exploit remotely increase the threat surface. However, the impact on system availability is limited. Organizations with public-facing YesWiki instances are at higher risk, as any visitor could trigger the malicious payload. Internal deployments with restricted access reduce exposure but do not eliminate risk if internal users can be targeted. Overall, the vulnerability could undermine trust in the wiki platform and lead to data breaches or operational disruptions if exploited.
Mitigation Recommendations
1. Immediate upgrade to YesWiki version 4.5.4 or later, where the vulnerability is patched. 2. If upgrading is not immediately possible, implement web application firewall (WAF) rules to detect and block suspicious comment inputs containing JavaScript block comment patterns or other obfuscated script payloads. 3. Conduct a thorough audit of existing comments to identify and remove potentially malicious scripts, especially those using obfuscated JavaScript techniques. 4. Enforce strict Content Security Policy (CSP) headers to restrict the execution of inline scripts and loading of external scripts, mitigating the impact of any injected payloads. 5. Educate users and administrators about the risks of XSS and encourage cautious behavior when interacting with user-generated content. 6. Monitor logs and user reports for signs of exploitation attempts or unusual behavior related to the wiki platform. 7. Review and enhance input validation and output encoding practices beyond the vendor patch, ensuring all user inputs are sanitized according to OWASP guidelines. 8. Consider isolating the wiki environment or limiting access to trusted users to reduce exposure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-22T22:41:54.913Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d983cc4522896dcbee994
Added to database: 5/21/2025, 9:09:16 AM
Last enriched: 6/25/2025, 2:04:37 AM
Last updated: 7/31/2025, 3:58:34 PM
Views: 10
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.