Lucene search

K

Wiki.js Security Vulnerabilities

cve
cve

CVE-2022-1681

Authentication Bypass Using an Alternate Path or Channel in GitHub repository requarks/wiki prior to 2.5.281. User can get root user...

7.2CVSS

7AI Score

0.001EPSS

2022-05-12 08:15 AM
56
5
cve
cve

CVE-2022-23654

Wiki.js is a wiki app built on Node.js. In affected versions an authenticated user with write access on a restricted set of paths can update a page outside the allowed paths by specifying a different target page ID while keeping the path intact. The access control incorrectly check the path access....

8.1CVSS

6.3AI Score

0.001EPSS

2022-02-22 08:15 PM
138
cve
cve

CVE-2021-25993

In Requarks wiki.js, versions 2.0.0-beta.147 to 2.5.255 are affected by Stored XSS vulnerability, where a low privileged (editor) user can upload a SVG file that contains malicious JavaScript while uploading assets in the page. That will send the JWT tokens to the attackerโ€™s server and will lead...

5.4CVSS

5.1AI Score

0.001EPSS

2021-12-29 05:15 PM
36
cve
cve

CVE-2021-43856

Wiki.js is a wiki app built on Node.js. Wiki.js 2.5.263 and earlier is vulnerable to stored cross-site scripting through non-image file uploads for file types that can be viewed directly inline in the browser. By creating a malicious file which can execute inline JS when viewed in the browser...

8.2CVSS

5.2AI Score

0.001EPSS

2021-12-27 06:15 PM
27
cve
cve

CVE-2021-43855

Wiki.js is a wiki app built on node.js. Wiki.js 2.5.263 and earlier is vulnerable to stored cross-site scripting through a SVG file upload made via a custom request with a fake MIME type. By creating a crafted SVG file, a malicious Wiki.js user may stage a stored cross-site scripting attack. This.....

8.2CVSS

5.3AI Score

0.001EPSS

2021-12-27 06:15 PM
24
cve
cve

CVE-2021-43842

Wiki.js is a wiki app built on Node.js. Wiki.js versions 2.5.257 and earlier are vulnerable to stored cross-site scripting through a SVG file upload. By creating a crafted SVG file, a malicious Wiki.js user may stage a stored cross-site scripting attack. This allows the attacker to execute...

5.4CVSS

5.3AI Score

0.001EPSS

2021-12-20 11:15 PM
28
cve
cve

CVE-2021-43800

Wiki.js is a wiki app built on Node.js. Prior to version 2.5.254, directory traversal outside of Wiki.js context is possible when a storage module with local asset cache fetching is enabled on a Windows host. A malicious user can potentially read any file on the file system by crafting a special...

7.5CVSS

7.3AI Score

0.001EPSS

2021-12-06 07:15 PM
16
cve
cve

CVE-2021-21383

Wiki.js an open-source wiki app built on Node.js. Wiki.js before version 2.5.191 is vulnerable to stored cross-site scripting through mustache expressions in code blocks. This vulnerability exists due to mustache expressions being parsed by Vue during content injection even though it is contained.....

7.6CVSS

5.4AI Score

0.001EPSS

2021-03-18 05:15 PM
20
cve
cve

CVE-2020-15274

In Wiki.js before version 2.5.162, an XSS payload can be injected in a page title and executed via the search results. While the title is properly escaped in both the navigation links and the actual page title, it is not the case in the search results. Commit...

5.8CVSS

5.2AI Score

0.001EPSS

2020-10-26 07:15 PM
15
cve
cve

CVE-2020-15236

In Wiki.js before version 2.5.151, directory traversal outside of Wiki.js context is possible when a storage module with local asset cache fetching is enabled. A malicious user can potentially read any file on the file system by crafting a special URL that allows for directory traversal. This is...

8.6CVSS

7.3AI Score

0.002EPSS

2020-10-05 03:15 PM
27
cve
cve

CVE-2020-4052

In Wiki.js before 2.4.107, there is a stored cross-site scripting through template injection. This vulnerability exists due to an insecure validation mechanism intended to insert v-pre tags into rendered HTML elements which contain curly-braces. By creating a crafted wiki page, a malicious Wiki.js....

6.3CVSS

6AI Score

0.001EPSS

2020-06-16 10:15 PM
33
2
cve
cve

CVE-2020-11051

In Wiki.js before 2.3.81, there is a stored XSS in the Markdown editor. An editor with write access to a page, using the Markdown editor, could inject an XSS payload into the content. If another editor (with write access as well) load the same page into the Markdown editor, the XSS payload will be....

6.9CVSS

4.8AI Score

0.001EPSS

2020-05-05 09:15 PM
43