CVE-2026-34598

YesWiki is a wiki system written in PHP. Prior to version 4.6.0, a stored and blind XSS vulnerability exists in the form title field. A malicious attacker can inject JavaScript without any authentication via a form title that is saved in the backend database. When any user visits that injected page, the JavaScript payload gets executed. This issue has been patched in version 4.6.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:*

History

10 Apr 2026, 15:58

Type Values Removed Values Added
First Time Yeswiki yeswiki
Yeswiki
CPE cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
References () https://github.com/YesWiki/yeswiki/releases/tag/v4.6.0 - () https://github.com/YesWiki/yeswiki/releases/tag/v4.6.0 - Product, Release Notes
References () https://github.com/YesWiki/yeswiki/security/advisories/GHSA-37fq-47qj-6j5j - () https://github.com/YesWiki/yeswiki/security/advisories/GHSA-37fq-47qj-6j5j - Exploit, Vendor Advisory

02 Apr 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-02 18:16

Updated : 2026-04-10 15:58


NVD link : CVE-2026-34598

Mitre link : CVE-2026-34598

CVE.ORG link : CVE-2026-34598


JSON object : View

Products Affected

yeswiki

  • yeswiki
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-87

Improper Neutralization of Alternate XSS Syntax