{"id":"CVE-2025-46347","summary":"YesWiki Remote Code Execution via Arbitrary PHP File Write and Execution","details":"YesWiki is a wiki system written in PHP. Prior to version 4.5.4, YesWiki vulnerable to remote code execution. An arbitrary file write can be used to write a file with a PHP extension, which then can be browsed to in order to execute arbitrary code on the server, resulting in a full compromise of the server. This could potentially be performed unwittingly by a user. This issue has been patched in version 4.5.4.","aliases":["GHSA-88xg-v53p-fpvf"],"modified":"2026-04-10T05:28:25.582254Z","published":"2025-04-29T17:11:05.404Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/46xxx/CVE-2025-46347.json","cwe_ids":["CWE-116"],"cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/46xxx/CVE-2025-46347.json"},{"type":"ADVISORY","url":"https://github.com/YesWiki/yeswiki/security/advisories/GHSA-88xg-v53p-fpvf"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-46347"},{"type":"FIX","url":"https://github.com/YesWiki/yeswiki/commit/8fe5275a78dc7e0f9c242baa3cbac6b5ac1cc066"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/yeswiki/yeswiki","events":[{"introduced":"0"},{"fixed":"4e9e51d80cd024ed2ac5c12c820817e6d8c2655a"}]}],"versions":["v4.1.0","v4.1.5","v4.2.0","v4.2.1","v4.2.2","v4.3.0","v4.3.1","v4.4.0","v4.4.1","v4.4.2","v4.4.3","v4.5.1","v4.5.2","v4.5.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-46347.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:P"}]}