{"id":23435,"date":"2025-04-15T01:11:02","date_gmt":"2025-04-15T01:11:02","guid":{"rendered":""},"modified":"2025-08-07T11:57:24","modified_gmt":"2025-08-07T17:57:24","slug":"cve-2025-31131-path-traversal-vulnerability-in-yeswiki-system","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-31131-path-traversal-vulnerability-in-yeswiki-system\/","title":{"rendered":"<strong>CVE-2025-31131: Path Traversal Vulnerability in YesWiki System<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>In this article, we will be discussing the recently discovered &#8220;CVE-2025-31131&#8221; vulnerability. The software affected is YesWiki, a wiki creation system written in PHP. This vulnerability poses a significant <a href=\"https:\/\/www.ameeba.com\/blog\/unmasking-cybersecurity-threats-dna-testing-firms-privacy-and-security-lapses\/\"  data-wpil-monitor-id=\"27021\">threat to system security<\/a> and data integrity, as it allows attackers to read arbitrary files on the server. Given the degree of potential system compromise or data leakage, it is crucial for administrators and users to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-51063-understanding-and-mitigating-a-dom-based-xss-vulnerability-in-qstar-archive-solutions\/\"  data-wpil-monitor-id=\"27045\">understand the nature of this vulnerability<\/a>, its potential impact, and the steps needed for mitigation.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-31131<br \/>\nSeverity: High (CVSS Score: 8.6)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-0576-critical-vulnerability-in-totolink-lr1200gb-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"29396\">Potential system<\/a> compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-4175813672\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>YesWiki | <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3248-critical-code-injection-vulnerability-in-langflow-versions-prior-to-1-3-0\/\"  data-wpil-monitor-id=\"30424\">Versions Prior<\/a> to 4.5.2<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-0572-critical-vulnerability-in-totolink-lr1200gb-leading-to-system-compromise\/\"  data-wpil-monitor-id=\"29004\">vulnerability lies in the &#8216;squelette&#8217; parameter of YesWiki&#8217;s system<\/a>. This parameter is not properly sanitized, making it susceptible to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-32629-critical-path-traversal-vulnerability-in-wp-businessdirectory-plugin\/\"  data-wpil-monitor-id=\"32937\">path traversal<\/a> attacks. In this type of attack, an attacker <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-53964-critical-file-manipulation-vulnerability-in-goldendict\/\"  data-wpil-monitor-id=\"67186\">manipulates variables referencing files<\/a> with &#8216;..&#8217; sequences and its variations. By doing this, the attacker can <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-43564-improper-access-control-vulnerability-in-coldfusion-leading-to-arbitrary-file-system-read\/\"  data-wpil-monitor-id=\"49406\">access directories and files<\/a> that they should not be able to access. This can <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3328-buffer-overflow-vulnerability-in-tenda-ac1206-could-lead-to-system-compromise\/\"  data-wpil-monitor-id=\"29856\">lead<\/a> to the reading of sensitive data or even system compromise if system files or services are affected.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-3390137938\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here is a conceptual example of how this <a href=\"https:\/\/www.ameeba.com\/blog\/fortinet-s-fortigate-vulnerability-ssl-vpn-symlink-exploit-puts-user-access-at-risk-post-patching\/\"  data-wpil-monitor-id=\"30074\">vulnerability might be exploited<\/a>. This is a sample HTTP request that uses the squelette parameter to attempt a <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-32631-path-traversal-vulnerability-in-oxygen-mydata-for-woocommerce\/\"  data-wpil-monitor-id=\"32941\">path traversal<\/a> attack.<\/p>\n<pre><code class=\"\" data-line=\"\">GET \/index.php?wiki=squelette&amp;param=..\/..\/..\/etc\/passwd HTTP\/1.1\nHost: target.example.com<\/code><\/pre>\n<p>In this example, the attacker attempts to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-48766-critical-unauthenticated-file-reading-vulnerability-in-netalertx\/\"  data-wpil-monitor-id=\"50112\">read the &#8216;\/etc\/passwd&#8217; file<\/a>, a standard Unix file that contains basic user account information. If the attack is successful, the server would return the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-32202-unrestricted-file-upload-vulnerability-in-brian-batt-s-insert-or-embed-articulate-content-into-wordpress\/\"  data-wpil-monitor-id=\"31979\">contents of this file<\/a>, potentially revealing sensitive information.<\/p>\n<p><strong>Mitigation<\/strong><\/p>\n<p>The primary mitigation for this vulnerability is to apply the vendor&#8217;s patch. YesWiki has already addressed this issue in version 4.5.2, so upgrading to this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-21632-critical-vulnerability-in-omniauth-microsoft-graph-prior-to-version-2-0-0\/\"  data-wpil-monitor-id=\"30703\">version or later will resolve the vulnerability<\/a>. If patching is not immediately possible, using a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can provide temporary mitigation. These systems can be configured to block <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-32633-path-traversal-vulnerability-in-neoslab-database-toolset\/\"  data-wpil-monitor-id=\"33569\">path traversal<\/a> attempts, helping to protect the system until the patch can be applied.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview In this article, we will be discussing the recently discovered &#8220;CVE-2025-31131&#8221; vulnerability. The software affected is YesWiki, a wiki creation system written in PHP. This vulnerability poses a significant threat to system security and data integrity, as it allows attackers to read arbitrary files on the server. Given the degree of potential system compromise [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[85],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-23435","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-directory-traversal"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/23435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=23435"}],"version-history":[{"count":16,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/23435\/revisions"}],"predecessor-version":[{"id":61019,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/23435\/revisions\/61019"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=23435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=23435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=23435"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=23435"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=23435"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=23435"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=23435"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=23435"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=23435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}