Requarks

Wiki.Js

15 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 18.11.2025 00:00:00
  • Zuletzt bearbeitet 31.12.2025 02:06:51

Requarks Wiki.js 2.5.307 does not properly revoke or invalidate active JWT tokens when a user logs out. As a result, previously issued tokens remain valid and can be reused to access the system, even after logout. This behavior affects session integr...

  • EPSS 0.05%
  • Veröffentlicht 18.09.2024 17:15:18
  • Zuletzt bearbeitet 20.09.2024 12:30:17

Wiki.js is an open source wiki app built on Node.js. A disabled user can still gain access to a wiki by abusing the password reset function. While setting up SMTP e-mail's on my server, I tested said e-mails by performing a password reset with my tes...

  • EPSS 0.3%
  • Veröffentlicht 20.05.2024 22:15:08
  • Zuletzt bearbeitet 21.11.2024 09:19:14

Wiki.js is al wiki app built on Node.js. Client side template injection was discovered, that could allow an attacker to inject malicious JavaScript into the content section of pages that would execute once a victim loads the page that contains the pa...

Exploit
  • EPSS 0.28%
  • Veröffentlicht 12.05.2022 08:15:07
  • Zuletzt bearbeitet 21.11.2024 06:41:14

Authentication Bypass Using an Alternate Path or Channel in GitHub repository requarks/wiki prior to 2.5.281. User can get root user permissions

  • EPSS 0.24%
  • Veröffentlicht 22.02.2022 20:15:07
  • Zuletzt bearbeitet 21.11.2024 06:49:01

Wiki.js is a wiki app built on Node.js. In affected versions an authenticated user with write access on a restricted set of paths can update a page outside the allowed paths by specifying a different target page ID while keeping the path intact. The ...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 29.12.2021 17:15:07
  • Zuletzt bearbeitet 21.11.2024 05:55:45

In Requarks wiki.js, versions 2.0.0-beta.147 to 2.5.255 are affected by Stored XSS vulnerability, where a low privileged (editor) user can upload a SVG file that contains malicious JavaScript while uploading assets in the page. That will send the JWT...

Exploit
  • EPSS 0.36%
  • Veröffentlicht 27.12.2021 18:15:07
  • Zuletzt bearbeitet 21.11.2024 06:29:56

Wiki.js is a wiki app built on node.js. Wiki.js 2.5.263 and earlier is vulnerable to stored cross-site scripting through a SVG file upload made via a custom request with a fake MIME type. By creating a crafted SVG file, a malicious Wiki.js user may s...

Exploit
  • EPSS 0.43%
  • Veröffentlicht 27.12.2021 18:15:07
  • Zuletzt bearbeitet 21.11.2024 06:29:56

Wiki.js is a wiki app built on Node.js. Wiki.js 2.5.263 and earlier is vulnerable to stored cross-site scripting through non-image file uploads for file types that can be viewed directly inline in the browser. By creating a malicious file which can e...

  • EPSS 0.26%
  • Veröffentlicht 20.12.2021 23:15:29
  • Zuletzt bearbeitet 21.11.2024 06:29:54

Wiki.js is a wiki app built on Node.js. Wiki.js versions 2.5.257 and earlier are vulnerable to stored cross-site scripting through a SVG file upload. By creating a crafted SVG file, a malicious Wiki.js user may stage a stored cross-site scripting att...

  • EPSS 0.35%
  • Veröffentlicht 06.12.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:29:49

Wiki.js is a wiki app built on Node.js. Prior to version 2.5.254, directory traversal outside of Wiki.js context is possible when a storage module with local asset cache fetching is enabled on a Windows host. A malicious user can potentially read any...