Cyber Posture

CVE-2025-24017

HighPublic PoC

Published: 21 January 2025

Published
21 January 2025
Modified
09 May 2025
KEV Added
Patch
CVSS Score 7.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
EPSS Score 0.0029 51.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may rely upon a user clicking a malicious link in order to gain execution.

Security Summary

CVE-2025-24017 is a DOM-based cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting YesWiki, a wiki system written in PHP. Versions up to and including 4.4.5 are vulnerable due to improper server-side sanitization in the search by tag feature. When a non-existent tag is searched, it is reflected on the page without proper escaping, enabling attackers to craft malicious links that trigger XSS on any of YesWiki's pages when clicked by a victim. The issue has a CVSS v3.1 base score of 7.6 (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L), indicating high integrity impact with low confidentiality and availability effects.

Any unauthenticated end-user can exploit this vulnerability by generating a malicious link that leverages the tag search reflection. Exploitation requires a victim to click the link, after which the XSS payload executes in the victim's browser context. Successful attacks enable account takeover, allowing attackers to steal other users' accounts, modify pages and comments, alter permissions, and extract sensitive user data such as emails. This compromises the integrity, availability, and confidentiality of the affected YesWiki instance.

Mitigation is available in YesWiki version 4.5.0, which patches the server-side sanitization issue. Security practitioners should upgrade to this version immediately. Additional details are provided in the YesWiki GitHub security advisory (GHSA-wphc-5f2j-jhvg) and the specific commit (c1e28b59394957902c31c850219e4504a20db98b) that addresses the flaw.

Details

CWE(s)
CWE-79

Affected Products

yeswiki
yeswiki
≤ 4.5.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
Why these techniques?

The DOM-based XSS vulnerability in the public-facing YesWiki wiki application is directly exploited when victims click attacker-crafted malicious links, enabling initial access and subsequent account takeover.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References