Логотип exploitDog
bind:CVE-2025-46346
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-46346

Количество 2

Количество 2

nvd логотип

CVE-2025-46346

10 месяцев назад

YesWiki is a wiki system written in PHP. Prior to version 4.5.4, a stored cross-site scripting (XSS) vulnerability was discovered in the application’s comments feature. This issue allows a malicious actor to inject JavaScript payloads that are stored and later executed in the browser of any user viewing the affected comment. The XSS occurs because the application fails to properly sanitize or encode user input submitted to the comments. Notably, the application sanitizes or does not allow execution of `<script>` tags, but does not account for payloads obfuscated using JavaScript block comments like `/* JavaScriptPayload */`. This issue has been patched in version 4.5.4.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-59x8-cvxh-3mm4

10 месяцев назад

YesWiki Stored XSS Vulnerability in Comments

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-46346

YesWiki is a wiki system written in PHP. Prior to version 4.5.4, a stored cross-site scripting (XSS) vulnerability was discovered in the application’s comments feature. This issue allows a malicious actor to inject JavaScript payloads that are stored and later executed in the browser of any user viewing the affected comment. The XSS occurs because the application fails to properly sanitize or encode user input submitted to the comments. Notably, the application sanitizes or does not allow execution of `<script>` tags, but does not account for payloads obfuscated using JavaScript block comments like `/* JavaScriptPayload */`. This issue has been patched in version 4.5.4.

CVSS3: 5.4
0%
Низкий
10 месяцев назад
github логотип
GHSA-59x8-cvxh-3mm4

YesWiki Stored XSS Vulnerability in Comments

0%
Низкий
10 месяцев назад

Уязвимостей на страницу