Untriaged
YesWiki has Persistant Blind XSS at "/?BazaR&vue=consulter"
YesWiki is a wiki system written in PHP. Prior to version 4.6.0, a stored and blind XSS vulnerability exists in the form title field. A malicious attacker can inject JavaScript without any authentication via a form title that is saved in the backend database. When any user visits that injected page, the JavaScript payload gets executed. This issue has been patched in version 4.6.0.
References
-
https://github.com/YesWiki/yeswiki/security/advisories/GHSA-37fq-47qj-6j5j x_refsource_CONFIRM
-
https://github.com/YesWiki/yeswiki/releases/tag/v4.6.0 x_refsource_MISC
Affected products
yeswiki
- ==< 4.6.0