CVE-2025-46549: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in YesWiki yeswiki
YesWiki is a wiki system written in PHP. Prior to version 4.5.4, an attacker can use a reflected cross-site scripting attack to steal cookies from an authenticated user by having them click on a malicious link. Stolen cookies allow the attacker to take over the user’s session. This vulnerability may also allow attackers to deface the website or embed malicious content. This issue has been patched in version 4.5.4.
AI Analysis
Technical Summary
CVE-2025-46549 is a reflected Cross-Site Scripting (XSS) vulnerability affecting YesWiki, a PHP-based wiki system, in versions prior to 4.5.4. The vulnerability arises from improper neutralization of user-supplied input during web page generation, classified under CWE-79. An attacker can craft a malicious URL containing executable script code that, when clicked by an authenticated user, executes in the victim's browser context. This allows the attacker to steal session cookies, enabling session hijacking and unauthorized access to the victim's account. Beyond session theft, the attacker may also deface the website or inject malicious content, potentially damaging the integrity and reputation of the affected site. The vulnerability requires no prior authentication but does require user interaction (clicking the malicious link). The CVSS v3.1 base score is 4.3 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, but user interaction needed, and limited impact primarily on integrity. No known exploits are currently reported in the wild. The issue has been addressed in YesWiki version 4.5.4, where proper input sanitization and output encoding have been implemented to mitigate this reflected XSS risk.
Potential Impact
For European organizations using YesWiki versions earlier than 4.5.4, this vulnerability poses a risk of session hijacking through stolen cookies, which can lead to unauthorized access to sensitive wiki content. This can compromise the confidentiality and integrity of internal documentation, collaborative projects, or knowledge bases. Website defacement or injection of malicious content can damage organizational reputation and trust, especially for public-facing wikis. Since YesWiki is often used by small to medium enterprises, educational institutions, and non-profits, the impact may be more pronounced where security resources are limited. The requirement for user interaction (clicking a malicious link) means phishing or social engineering campaigns could be used to exploit this vulnerability. While availability is not directly impacted, the indirect effects of compromised user sessions and content integrity can disrupt normal operations and collaboration workflows.
Mitigation Recommendations
1. Immediate upgrade to YesWiki version 4.5.4 or later to apply the official patch that fixes the XSS vulnerability. 2. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 3. Educate users on phishing risks and encourage cautious behavior regarding clicking unknown or suspicious links, especially in emails or messages. 4. Employ web application firewalls (WAFs) with rules tuned to detect and block reflected XSS attack patterns targeting YesWiki endpoints. 5. Regularly audit and sanitize all user-generated content and input fields within YesWiki installations to ensure no residual injection vectors remain. 6. Monitor web server and application logs for unusual URL requests or repeated suspicious activity indicative of attempted exploitation. 7. For organizations with custom YesWiki deployments, review and harden any custom plugins or extensions that might bypass standard input validation mechanisms.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-46549: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in YesWiki yeswiki
Description
YesWiki is a wiki system written in PHP. Prior to version 4.5.4, an attacker can use a reflected cross-site scripting attack to steal cookies from an authenticated user by having them click on a malicious link. Stolen cookies allow the attacker to take over the user’s session. This vulnerability may also allow attackers to deface the website or embed malicious content. This issue has been patched in version 4.5.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-46549 is a reflected Cross-Site Scripting (XSS) vulnerability affecting YesWiki, a PHP-based wiki system, in versions prior to 4.5.4. The vulnerability arises from improper neutralization of user-supplied input during web page generation, classified under CWE-79. An attacker can craft a malicious URL containing executable script code that, when clicked by an authenticated user, executes in the victim's browser context. This allows the attacker to steal session cookies, enabling session hijacking and unauthorized access to the victim's account. Beyond session theft, the attacker may also deface the website or inject malicious content, potentially damaging the integrity and reputation of the affected site. The vulnerability requires no prior authentication but does require user interaction (clicking the malicious link). The CVSS v3.1 base score is 4.3 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, but user interaction needed, and limited impact primarily on integrity. No known exploits are currently reported in the wild. The issue has been addressed in YesWiki version 4.5.4, where proper input sanitization and output encoding have been implemented to mitigate this reflected XSS risk.
Potential Impact
For European organizations using YesWiki versions earlier than 4.5.4, this vulnerability poses a risk of session hijacking through stolen cookies, which can lead to unauthorized access to sensitive wiki content. This can compromise the confidentiality and integrity of internal documentation, collaborative projects, or knowledge bases. Website defacement or injection of malicious content can damage organizational reputation and trust, especially for public-facing wikis. Since YesWiki is often used by small to medium enterprises, educational institutions, and non-profits, the impact may be more pronounced where security resources are limited. The requirement for user interaction (clicking a malicious link) means phishing or social engineering campaigns could be used to exploit this vulnerability. While availability is not directly impacted, the indirect effects of compromised user sessions and content integrity can disrupt normal operations and collaboration workflows.
Mitigation Recommendations
1. Immediate upgrade to YesWiki version 4.5.4 or later to apply the official patch that fixes the XSS vulnerability. 2. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 3. Educate users on phishing risks and encourage cautious behavior regarding clicking unknown or suspicious links, especially in emails or messages. 4. Employ web application firewalls (WAFs) with rules tuned to detect and block reflected XSS attack patterns targeting YesWiki endpoints. 5. Regularly audit and sanitize all user-generated content and input fields within YesWiki installations to ensure no residual injection vectors remain. 6. Monitor web server and application logs for unusual URL requests or repeated suspicious activity indicative of attempted exploitation. 7. For organizations with custom YesWiki deployments, review and harden any custom plugins or extensions that might bypass standard input validation mechanisms.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-24T21:10:48.172Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983bc4522896dcbee2d3
Added to database: 5/21/2025, 9:09:15 AM
Last enriched: 6/25/2025, 6:04:53 AM
Last updated: 8/16/2025, 7:20:06 PM
Views: 14
Related Threats
CVE-2025-9187: Memory safety bugs fixed in Firefox 142 and Thunderbird 142 in Mozilla Firefox
UnknownCVE-2025-9186: Spoofing issue in the Address Bar component of Firefox Focus for Android in Mozilla Firefox
UnknownCVE-2025-9185: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 in Mozilla Firefox
UnknownCVE-2025-9184: Memory safety bugs fixed in Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 in Mozilla Firefox
UnknownCVE-2025-9183: Spoofing issue in the Address Bar component in Mozilla Firefox
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.