YesWiki is a wiki system written in PHP. Prior to version 4.6.0, a stored and blind XSS vulnerability exists in the form title field. A malicious attacker can inject JavaScript without any authentication via a form title that is saved in the backend database. When any user visits that injected page, the JavaScript payload gets executed. This issue has been patched in version 4.6.0.

Project Subscriptions

No data.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-37fq-47qj-6j5j YesWiki has Persistant Blind XSS at "/?BazaR&vue=consulter"
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description YesWiki is a wiki system written in PHP. Prior to version 4.6.0, a stored and blind XSS vulnerability exists in the form title field. A malicious attacker can inject JavaScript without any authentication via a form title that is saved in the backend database. When any user visits that injected page, the JavaScript payload gets executed. This issue has been patched in version 4.6.0.
Title YesWiki has Persistant Blind XSS at "/?BazaR&vue=consulter"
Weaknesses CWE-79
CWE-87
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T19:09:44.401Z

Reserved: 2026-03-30T17:15:52.499Z

Link: CVE-2026-34598

cve-icon Vulnrichment

Updated: 2026-04-02T19:09:40.742Z

cve-icon NVD

Status : Received

Published: 2026-04-02T18:16:31.740

Modified: 2026-04-02T18:16:31.740

Link: CVE-2026-34598

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses