YesWiki is a wiki system written in PHP. Prior to version 4.6.0, a stored and blind XSS vulnerability exists in the form title field. A malicious attacker can inject JavaScript without any authentication via a form title that is saved in the backend database. When any user visits that injected page, the JavaScript payload gets executed. This issue has been patched in version 4.6.0.
References
| Link | Resource |
|---|---|
| https://github.com/YesWiki/yeswiki/releases/tag/v4.6.0 | Product Release Notes |
| https://github.com/YesWiki/yeswiki/security/advisories/GHSA-37fq-47qj-6j5j | Exploit Vendor Advisory |
Configurations
History
10 Apr 2026, 15:58
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Yeswiki yeswiki
Yeswiki |
|
| CPE | cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
| References | () https://github.com/YesWiki/yeswiki/releases/tag/v4.6.0 - Product, Release Notes | |
| References | () https://github.com/YesWiki/yeswiki/security/advisories/GHSA-37fq-47qj-6j5j - Exploit, Vendor Advisory |
02 Apr 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-02 18:16
Updated : 2026-04-10 15:58
NVD link : CVE-2026-34598
Mitre link : CVE-2026-34598
CVE.ORG link : CVE-2026-34598
JSON object : View
Products Affected
yeswiki
- yeswiki
