{ "schema_version": "1.4.0", "id": "GHSA-2f8p-qqx2-gwr2", "modified": "2025-04-29T20:27:19Z", "published": "2025-04-29T14:38:12Z", "aliases": [ "CVE-2025-46349" ], "summary": "YesWiki Vulnerable to Unauthenticated Reflected Cross-site Scripting", "details": "### Summary\nReflected XSS has been detected in the file upload form. Vulnerability can be exploited without authentication\n\nThis Proof of Concept has been performed using the followings:\n\n- YesWiki v4.5.3 (doryphore-dev branch)\n- Docker environnment (docker/docker-compose.yml)\n\n### Vulnerable code\nThe vulnerability is located in the [file](https://github.com/YesWiki/yeswiki/blob/6894234bbde6ab168bf4253f9a581bd24bf53766/tools/attach/libs/attach.lib.php#L724-L735)\n```\n public function showUploadForm()\n {\n $this->file = $_GET['file'];\n echo '