Lucene search

K

9 matches found

CVE
CVE
added 2022/02/22 8:15 p.m.155 views

CVE-2022-23654

Wiki.js is a wiki app built on Node.js. In affected versions an authenticated user with write access on a restricted set of paths can update a page outside the allowed paths by specifying a different target page ID while keeping the path intact. The access control incorrectly check the path access ...

8.1CVSS6.8AI score0.00243EPSS
CVE
CVE
added 2022/05/12 8:15 a.m.75 views

CVE-2022-1681

Authentication Bypass Using an Alternate Path or Channel in GitHub repository requarks/wiki prior to 2.5.281. User can get root user permissions

9CVSS7.1AI score0.00268EPSS
CVE
CVE
added 2021/12/27 6:15 p.m.61 views

CVE-2021-43856

Wiki.js is a wiki app built on Node.js. Wiki.js 2.5.263 and earlier is vulnerable to stored cross-site scripting through non-image file uploads for file types that can be viewed directly inline in the browser. By creating a malicious file which can execute inline JS when viewed in the browser (e.g....

8.2CVSS5.7AI score0.00425EPSS
CVE
CVE
added 2020/05/05 9:15 p.m.59 views

CVE-2020-11051

In Wiki.js before 2.3.81, there is a stored XSS in the Markdown editor. An editor with write access to a page, using the Markdown editor, could inject an XSS payload into the content. If another editor (with write access as well) load the same page into the Markdown editor, the XSS payload will be ...

6.9CVSS5.1AI score0.00323EPSS
CVE
CVE
added 2020/06/16 10:15 p.m.45 views

CVE-2020-4052

In Wiki.js before 2.4.107, there is a stored cross-site scripting through template injection. This vulnerability exists due to an insecure validation mechanism intended to insert v-pre tags into rendered HTML elements which contain curly-braces. By creating a crafted wiki page, a malicious Wiki.js ...

6.3CVSS6.1AI score0.0024EPSS
CVE
CVE
added 2021/12/27 6:15 p.m.39 views

CVE-2021-43855

Wiki.js is a wiki app built on node.js. Wiki.js 2.5.263 and earlier is vulnerable to stored cross-site scripting through a SVG file upload made via a custom request with a fake MIME type. By creating a crafted SVG file, a malicious Wiki.js user may stage a stored cross-site scripting attack. This a...

8.2CVSS5.7AI score0.00361EPSS
CVE
CVE
added 2021/03/18 5:15 p.m.32 views

CVE-2021-21383

Wiki.js an open-source wiki app built on Node.js. Wiki.js before version 2.5.191 is vulnerable to stored cross-site scripting through mustache expressions in code blocks. This vulnerability exists due to mustache expressions being parsed by Vue during content injection even though it is contained w...

7.6CVSS5.7AI score0.00263EPSS
CVE
CVE
added 2021/12/06 7:15 p.m.32 views

CVE-2021-43800

Wiki.js is a wiki app built on Node.js. Prior to version 2.5.254, directory traversal outside of Wiki.js context is possible when a storage module with local asset cache fetching is enabled on a Windows host. A malicious user can potentially read any file on the file system by crafting a special UR...

7.5CVSS7.4AI score0.00353EPSS
CVE
CVE
added 2020/10/26 7:15 p.m.25 views

CVE-2020-15274

In Wiki.js before version 2.5.162, an XSS payload can be injected in a page title and executed via the search results. While the title is properly escaped in both the navigation links and the actual page title, it is not the case in the search results. Commit a57d9af34c15adbf460dde6553d964efddf433d...

5.8CVSS5.3AI score0.0059EPSS