Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-9333 | Yeswiki Path Traversal vulnerability allows arbitrary read of files |
Github GHSA |
GHSA-w34w-fvp3-68xm | Yeswiki Path Traversal vulnerability allows arbitrary read of files |
Fri, 09 May 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yeswiki
Yeswiki yeswiki |
|
| CPEs | cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Yeswiki
Yeswiki yeswiki |
Tue, 01 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 01 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. This vulnerability is fixed in 4.5.2. | |
| Title | Path Traversal allowing arbitrary read of files in Yeswiki | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-01T16:11:20.111Z
Reserved: 2025-03-26T15:04:52.627Z
Link: CVE-2025-31131
Updated: 2025-04-01T16:09:56.262Z
Status : Analyzed
Published: 2025-04-01T15:16:07.790
Modified: 2025-05-09T14:04:06.663
Link: CVE-2025-31131
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA