Overview
This report shines a light on the CVE-2025-46349 vulnerability, a reflected XSS (Cross-Site Scripting) flaw found in YesWiki, a PHP-based wiki system. The vulnerability, rated with a CVSS Severity Score of 7.6, affects all versions of YesWiki prior to 4.5.4. This vulnerability is significant due to its potential to compromise systems or lead to data leakage.
Vulnerability Summary
CVE ID: CVE-2025-46349
Severity: High (CVSS: 7.6)
Attack Vector: Remote
Privileges Required: None
User Interaction: Required
Impact: System Compromise, Data Leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
YesWiki | Prior to 4.5.4
How the Exploit Works
This vulnerability stems from improper sanitization of user input in the file upload form of YesWiki. An unauthenticated attacker can craft a malicious link, embedding a script. This script is then reflected back to the user’s browser when the victim clicks the link, executing within the context of the user’s session. This can lead to unauthorized actions being performed, session hijacking, or sensitive data exposure.
Conceptual Example Code
Here is a conceptual example of how an HTTP request carrying the malicious payload might look:
GET /file-upload-form?filename=<script>malicious_code_here</script> HTTP/1.1
Host: vulnerable-yeswiki-site.com
In this example, the “malicious_code_here” would be replaced by the actual exploit code the attacker wishes to run on the victim’s browser.
Mitigation Guidance
Users are advised to immediately update their YesWiki installations to version 4.5.4 or later, where this vulnerability has been patched. In situations where immediate update is not possible, using a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can serve as temporary mitigation, blocking or alerting on potential exploit attempts.

