Логотип exploitDog
bind:CVE-2025-46347
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-46347

Количество 2

Количество 2

nvd логотип

CVE-2025-46347

10 месяцев назад

YesWiki is a wiki system written in PHP. Prior to version 4.5.4, YesWiki vulnerable to remote code execution. An arbitrary file write can be used to write a file with a PHP extension, which then can be browsed to in order to execute arbitrary code on the server, resulting in a full compromise of the server. This could potentially be performed unwittingly by a user. This issue has been patched in version 4.5.4.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-88xg-v53p-fpvf

10 месяцев назад

YesWiki Remote Code Execution via Arbitrary PHP File Write and Execution

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-46347

YesWiki is a wiki system written in PHP. Prior to version 4.5.4, YesWiki vulnerable to remote code execution. An arbitrary file write can be used to write a file with a PHP extension, which then can be browsed to in order to execute arbitrary code on the server, resulting in a full compromise of the server. This could potentially be performed unwittingly by a user. This issue has been patched in version 4.5.4.

CVSS3: 9.8
2%
Низкий
10 месяцев назад
github логотип
GHSA-88xg-v53p-fpvf

YesWiki Remote Code Execution via Arbitrary PHP File Write and Execution

2%
Низкий
10 месяцев назад

Уязвимостей на страницу