CVE-2025-46347

9.8 CRITICAL

📋 TL;DR

YesWiki versions before 4.5.4 contain a remote code execution vulnerability that allows attackers to write arbitrary PHP files to the server. When exploited, this gives attackers full control over the affected server. All YesWiki installations running vulnerable versions are affected.

💻 Affected Systems

Products:
  • YesWiki
Versions: All versions prior to 4.5.4
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: All YesWiki installations with default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Attacker gains shell access, installs web shells, steals sensitive data, and uses server for further attacks.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF rules, and file integrity monitoring are in place.

🌐 Internet-Facing: HIGH - Web applications are directly accessible and vulnerable to unauthenticated exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is straightforward to exploit with publicly available details. Attackers can write PHP files and execute them remotely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.5.4

Vendor Advisory: https://github.com/YesWiki/yeswiki/security/advisories/GHSA-88xg-v53p-fpvf

Restart Required: No

Instructions:

1. Backup your YesWiki installation and database. 2. Download YesWiki version 4.5.4 from the official repository. 3. Replace all files with the patched version. 4. Verify the installation works correctly.

🔧 Temporary Workarounds

Restrict PHP File Uploads

all

Configure web server to block execution of uploaded PHP files in upload directories

# For Apache: Add to .htaccess in upload directories
<Files *.php>
    Order Deny,Allow
    Deny from all
</Files>
# For Nginx: Add to server block
location ~* \.php$ {
    deny all;
    return 403;
}

🧯 If You Can't Patch

  • Implement strict WAF rules to block file upload attempts with PHP extensions
  • Disable file upload functionality entirely in YesWiki configuration

🔍 How to Verify

Check if Vulnerable:

Check YesWiki version in admin panel or examine the core files for version information

Check Version:

Check the version in the YesWiki admin interface or examine the file 'includes/YesWiki.php' for version information

Verify Fix Applied:

Verify version is 4.5.4 or later and test that arbitrary PHP file uploads are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with PHP extensions
  • Multiple failed upload attempts
  • Requests to unusual PHP files in upload directories

Network Indicators:

  • HTTP POST requests with file uploads to YesWiki endpoints
  • Traffic patterns showing file upload followed by execution

SIEM Query:

source="web_server" AND (uri="*upload*" OR uri="*.php") AND method="POST" AND status="200"

🔗 References

📤 Share & Export