// For flags

CVE-2011-5025

Yaws-Wiki 1.88-1 (Erlang) - Persistent / Reflective Cross-Site Scripting

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple cross-site scripting (XSS) vulnerabilities in the wiki application in Yaws 1.88 allow remote attackers to inject arbitrary web script or HTML via (1) the tag parameter to editTag.yaws, (2) the index parameter to showOldPage.yaws, (3) the node parameter to allRefsToMe.yaws, or (4) the text parameter to editPage.yaws.

Varias vulnerabilidades de ejecución de comandos en sitios cruzados (XSS) en la aplicación de wiki en Yaws v1.88 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de (1) el parámetro de etiqueta para editTag.yaws, (2) el parámetro de índice de showOldPage.yaws, (3) el parámetro de nodo a allRefsToMe.yaws , o (4) el parámetro de texto a editPage.yaws.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-04-04 First Exploit
  • 2011-12-28 CVE Reserved
  • 2011-12-29 CVE Published
  • 2023-07-29 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Yaws
Search vendor "Yaws"
Yaws
Search vendor "Yaws" for product "Yaws"
1.88
Search vendor "Yaws" for product "Yaws" and version "1.88"
-
Affected