Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-f58v-p6j9-24c2 | YesWiki vulnerable to authenticated SQL Injection via id_fiche in EntryManager::formatDataBeforeSave() |
Thu, 07 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yeswiki
Yeswiki yeswiki |
|
| Vendors & Products |
Yeswiki
Yeswiki yeswiki |
Thu, 07 May 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | YesWiki is a wiki system written in PHP. Prior to version 4.6.1, YesWiki bazar module contains a SQL injection vulnerability in tools/bazar/services/EntryManager.php at line 704. The $data['id_fiche'] value (sourced from $_POST['id_fiche']) is concatenated directly into a raw SQL query without any sanitization or parameterization. This issue has been patched in version 4.6.1. | |
| Title | YesWiki vulnerable to authenticated SQL Injection via id_fiche in EntryManager::formatDataBeforeSave() | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T13:41:46.278Z
Reserved: 2026-04-17T12:59:15.739Z
Link: CVE-2026-41143
Updated: 2026-05-07T13:41:34.201Z
Status : Deferred
Published: 2026-05-07T06:16:04.550
Modified: 2026-05-07T15:43:39.827
Link: CVE-2026-41143
No data.
OpenCVE Enrichment
Updated: 2026-05-07T07:00:13Z
Github GHSA