VYPR
Moderate severityNVD Advisory· Published Sep 9, 2025· Updated Sep 10, 2025

CVE-2025-52277

CVE-2025-52277

Description

Cross Site Scripting vulnerability in YesWiki v.4.54 allows a remote attacker to execute arbitrary code via a crafted payload to the meta configuration robots field

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

YesWiki v4.54 is vulnerable to stored XSS via the meta robots configuration field, allowing lower-privilege admins to execute arbitrary scripts on every page.

Vulnerability

Overview

CVE-2025-52277 is a stored Cross-Site Scripting (XSS) vulnerability in YesWiki version 4.54. The root cause lies in the meta configuration panel, specifically the input field for setting the meta robots tag. This field does not properly sanitize user input, allowing an attacker to inject arbitrary JavaScript code [1][3].

Exploitation

An attacker with lower-privilege administrator access can exploit this vulnerability by navigating to the site configuration panel (Gestion de site -> Fichier de conf -> Tags meta for web indexing) and inserting a crafted payload into the meta[robots] field. For example, the payload "> will be stored and executed on every page of the wiki that any user visits [3]. No additional authentication or network position is required beyond the initial administrator session.

Impact

Successful exploitation allows the attacker to execute malicious scripts in the context of any user's browser session, including higher-privilege administrators and regular visitors. This can lead to session hijacking, credential theft, privilege escalation, and unauthorized actions performed on behalf of other users. The stored XSS of this nature affects all users because the injected script loads on every page via the meta tag [3].

Mitigation

As of the publication date (2025-09-09), no official patch has been confirmed in the YesWiki repository [2]. Administrators should restrict access to the meta robots field input carefully and consider applying input sanitization or upgrading once a fix is released. The vulnerability is not currently listed on CISA's Known Exploited Vulnerabilities (KEVulnerabilities (KEV) catalog.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
yeswiki/yeswikiPackagist
<= 4.5.4

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.