Ameeba Chat App store presentation
Download Ameeba Chat Today
Ameeba Blog Search

CVE-2025-46348: Unauthenticated Backup Exploitation of YesWiki Prior to Version 4.5.4

Ameeba’s Mission: Safeguarding privacy by securing data and communication with our patented anonymization technology.

Overview

The CVE-2025-46348 vulnerability is a critical flaw in the YesWiki system, a widely used wiki platform built with PHP. This vulnerability has far-reaching implications as it affects all versions prior to 4.5.4 and could potentially lead to system compromise or data leakage. The issue lies in the backup process of the system where unauthenticated users can create and download site backups, hence causing potential threats to the security of sensitive site data.

Vulnerability Summary

CVE ID: CVE-2025-46348
Severity: Critical (CVSS: 10.0)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System Compromise, Data Leakage

Affected Products

Ameeba Chat – The World’s Most Private Chat App
No phone number, email, or personal info required.

Product | Affected Versions

YesWiki | All versions prior to 4.5.4

How the Exploit Works

The exploit takes advantage of the vulnerability in the backup process of YesWiki systems where an unauthenticated user can initiate a backup and download it without needing authentication. Given that the system creates the archives with predictable filenames, an attacker can easily generate and download these archives. Moreover, this vulnerability can also be exploited to perform a Denial of Service (DoS) attack by continually creating archives until the file system is full.

Conceptual Example Code

While the exact code to exploit this vulnerability would vary, a conceptual example of a potential HTTP request to exploit this issue could look like this:

GET /backup/archive.tar.gz HTTP/1.1
Host: targetsite.com

In this example, `archive.tar.gz` is the predictable filename of the backup archive. A malicious actor could continuously send this request to both download the site’s backup and potentially fill up the server’s disk space.

Mitigation and Recommendations

The vulnerability has been patched in YesWiki version 4.5.4. Users are strongly recommended to update their systems to this version or later to prevent potential exploitation. For those who cannot immediately update their system, using a Web Application Firewall (WAF) or Intrusion Detection Systems (IDS) may provide a temporary mitigation. However, these are not long-term solutions and updating to the patched version remains the most secure option.

Disclaimer:

The information and code presented in this article are provided for educational and defensive cybersecurity purposes only. Any conceptual or pseudocode examples are simplified representations intended to raise awareness and promote secure development and system configuration practices.

Do not use this information to attempt unauthorized access or exploit vulnerabilities on systems that you do not own or have explicit permission to test.

Ameeba and its authors do not endorse or condone malicious behavior and are not responsible for misuse of the content. Always follow ethical hacking guidelines, responsible disclosure practices, and local laws.

Ameeba Chat
The world’s most private
chat app

No phone number, email, or personal info required. Stay anonymous with encrypted messaging and customizable aliases.