CVE-2025-52277
Description
Cross Site Scripting vulnerability in YesWiki v.4.54 allows a remote attacker to execute arbitrary code via a crafted payload to the meta configuration robots field
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
YesWiki v4.54 is vulnerable to stored XSS via the meta robots configuration field, allowing lower-privilege admins to execute arbitrary scripts on every page.
Vulnerability
Overview
CVE-2025-52277 is a stored Cross-Site Scripting (XSS) vulnerability in YesWiki version 4.54. The root cause lies in the meta configuration panel, specifically the input field for setting the meta robots tag. This field does not properly sanitize user input, allowing an attacker to inject arbitrary JavaScript code [1][3].
Exploitation
An attacker with lower-privilege administrator access can exploit this vulnerability by navigating to the site configuration panel (Gestion de site -> Fichier de conf -> Tags meta for web indexing) and inserting a crafted payload into the meta[robots] field. For example, the payload "> will be stored and executed on every page of the wiki that any user visits [3]. No additional authentication or network position is required beyond the initial administrator session.
Impact
Successful exploitation allows the attacker to execute malicious scripts in the context of any user's browser session, including higher-privilege administrators and regular visitors. This can lead to session hijacking, credential theft, privilege escalation, and unauthorized actions performed on behalf of other users. The stored XSS of this nature affects all users because the injected script loads on every page via the meta tag [3].
Mitigation
As of the publication date (2025-09-09), no official patch has been confirmed in the YesWiki repository [2]. Administrators should restrict access to the meta robots field input carefully and consider applying input sanitization or upgrading once a fix is released. The vulnerability is not currently listed on CISA's Known Exploited Vulnerabilities (KEVulnerabilities (KEV) catalog.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
yeswiki/yeswikiPackagist | <= 4.5.4 | — |
Affected products
2- YesWiki/YesWikidescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-29cj-cxw4-v4j2ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-52277ghsaADVISORY
- yeswiki.comghsaWEB
- github.com/nakkouchtarek/CVE/tree/main/CVE-2025-52277ghsaWEB
News mentions
0No linked articles in our index yet.