Vulnerability Description
YesWiki is a wiki system written in PHP. Prior to version 4.5.4, YesWiki vulnerable to remote code execution. An arbitrary file write can be used to write a file with a PHP extension, which then can be browsed to in order to execute arbitrary code on the server, resulting in a full compromise of the server. This could potentially be performed unwittingly by a user. This issue has been patched in version 4.5.4.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Yeswiki | Yeswiki | < 4.5.4 |
Related Weaknesses (CWE)
References
- https://github.com/YesWiki/yeswiki/commit/8fe5275a78dc7e0f9c242baa3cbac6b5ac1cc0Patch
- https://github.com/YesWiki/yeswiki/security/advisories/GHSA-88xg-v53p-fpvfExploitVendor Advisory
- https://github.com/YesWiki/yeswiki/security/advisories/GHSA-88xg-v53p-fpvfExploitVendor Advisory
FAQ
What is CVE-2025-46347?
CVE-2025-46347 is a vulnerability with a CVSS score of 9.8 (CRITICAL). YesWiki is a wiki system written in PHP. Prior to version 4.5.4, YesWiki vulnerable to remote code execution. An arbitrary file write can be used to write a file with a PHP extension, which then can b...
How severe is CVE-2025-46347?
CVE-2025-46347 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-46347?
Check the references section above for vendor advisories and patch information. Affected products include: Yeswiki Yeswiki.