CVE-2025-56643
- EPSS 0.07%
- Veröffentlicht 18.11.2025 00:00:00
- Zuletzt bearbeitet 31.12.2025 02:06:51
Requarks Wiki.js 2.5.307 does not properly revoke or invalidate active JWT tokens when a user logs out. As a result, previously issued tokens remain valid and can be reused to access the system, even after logout. This behavior affects session integr...
CVE-2024-45298
- EPSS 0.05%
- Veröffentlicht 18.09.2024 17:15:18
- Zuletzt bearbeitet 20.09.2024 12:30:17
Wiki.js is an open source wiki app built on Node.js. A disabled user can still gain access to a wiki by abusing the password reset function. While setting up SMTP e-mail's on my server, I tested said e-mails by performing a password reset with my tes...
CVE-2024-34710
- EPSS 0.3%
- Veröffentlicht 20.05.2024 22:15:08
- Zuletzt bearbeitet 21.11.2024 09:19:14
Wiki.js is al wiki app built on Node.js. Client side template injection was discovered, that could allow an attacker to inject malicious JavaScript into the content section of pages that would execute once a victim loads the page that contains the pa...
- EPSS 0.28%
- Veröffentlicht 12.05.2022 08:15:07
- Zuletzt bearbeitet 21.11.2024 06:41:14
Authentication Bypass Using an Alternate Path or Channel in GitHub repository requarks/wiki prior to 2.5.281. User can get root user permissions
CVE-2022-23654
- EPSS 0.24%
- Veröffentlicht 22.02.2022 20:15:07
- Zuletzt bearbeitet 21.11.2024 06:49:01
Wiki.js is a wiki app built on Node.js. In affected versions an authenticated user with write access on a restricted set of paths can update a page outside the allowed paths by specifying a different target page ID while keeping the path intact. The ...
CVE-2021-25993
- EPSS 0.21%
- Veröffentlicht 29.12.2021 17:15:07
- Zuletzt bearbeitet 21.11.2024 05:55:45
In Requarks wiki.js, versions 2.0.0-beta.147 to 2.5.255 are affected by Stored XSS vulnerability, where a low privileged (editor) user can upload a SVG file that contains malicious JavaScript while uploading assets in the page. That will send the JWT...
CVE-2021-43855
- EPSS 0.36%
- Veröffentlicht 27.12.2021 18:15:07
- Zuletzt bearbeitet 21.11.2024 06:29:56
Wiki.js is a wiki app built on node.js. Wiki.js 2.5.263 and earlier is vulnerable to stored cross-site scripting through a SVG file upload made via a custom request with a fake MIME type. By creating a crafted SVG file, a malicious Wiki.js user may s...
CVE-2021-43856
- EPSS 0.43%
- Veröffentlicht 27.12.2021 18:15:07
- Zuletzt bearbeitet 21.11.2024 06:29:56
Wiki.js is a wiki app built on Node.js. Wiki.js 2.5.263 and earlier is vulnerable to stored cross-site scripting through non-image file uploads for file types that can be viewed directly inline in the browser. By creating a malicious file which can e...
CVE-2021-43842
- EPSS 0.26%
- Veröffentlicht 20.12.2021 23:15:29
- Zuletzt bearbeitet 21.11.2024 06:29:54
Wiki.js is a wiki app built on Node.js. Wiki.js versions 2.5.257 and earlier are vulnerable to stored cross-site scripting through a SVG file upload. By creating a crafted SVG file, a malicious Wiki.js user may stage a stored cross-site scripting att...
CVE-2021-43800
- EPSS 0.35%
- Veröffentlicht 06.12.2021 19:15:07
- Zuletzt bearbeitet 21.11.2024 06:29:49
Wiki.js is a wiki app built on Node.js. Prior to version 2.5.254, directory traversal outside of Wiki.js context is possible when a storage module with local asset cache fetching is enabled on a Windows host. A malicious user can potentially read any...