Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | YesWiki <= 4.5.1 contains a reflected cross-site scripting caused by insufficient sanitization in user input, letting attackers steal cookies and hijack sessions, exploit requires user to click malicious link. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-46549.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-46348 | 10.0 CRITICAL | YesWiki Vulnerable to Unauthenticated Site Backup Creation and Download |
| CVE-2025-46349 | 7.6 HIGH | YesWiki Vulnerable to Unauthenticated Reflected Cross-site Scripting |
| CVE-2025-46550 | 4.3 MEDIUM | Yeswiki Vulnerable to Unauthenticated Reflected Cross-site Scripting |
| CVE-2025-46350 | 3.5 LOW | Yeswiki Vulnerable to Authenticated Reflected Cross-site Scripting |
| CVE-2025-46346 | YesWiki Vulnerable to Stored XSS in Comments | |
| CVE-2025-46347 | YesWiki Remote Code Execution via Arbitrary PHP File Write and Execution |
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.