Cyber Posture

CVE-2025-24018

HighPublic PoC

Published: 21 January 2025

Published
21 January 2025
Modified
09 May 2025
KEV Added
Patch
CVSS Score 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
EPSS Score 0.0020 42.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-24018 is a stored cross-site scripting (XSS) vulnerability in YesWiki, a wiki system written in PHP. It affects versions up to and including 4.4.5 and stems from the content edition feature, specifically the `{{attach}}` component used for attaching files or media to pages. When a file specified in the `file` attribute does not exist, the server generates an upload button that incorporates the filename, enabling the injection of malicious payloads that execute as stored XSS on any page loading the resource.

An authenticated user with rights to edit or create a page or comment can exploit this vulnerability. Successful exploitation allows the attacker to steal accounts, modify pages and comments, alter permissions, and extract sensitive user data such as emails, thereby compromising the integrity, availability, and confidentiality of the YesWiki instance.

The YesWiki security advisory (GHSA-w59h-3x3q-3p6j) and associated GitHub commit detail the patch in version 4.5.0, which addresses the issue in the `attach.lib.php` file around line 660. Security practitioners should upgrade to YesWiki 4.5.0 or later to mitigate the vulnerability.

Details

CWE(s)
CWE-79

Affected Products

yeswiki
yeswiki
≤ 4.5.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Stored XSS in public-facing YesWiki web app allows authenticated injection of malicious JavaScript payloads via the attach component that execute in victims' browsers (T1059.007); exploitation of the web application vulnerability aligns with T1190.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References