A vulnerability has been found in Zavy86 WikiDocs up to 1.0.78 and classified as problematic. This vulnerability affects unknown code of the file template.inc.php. The manipulation of the argument path leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/Zavy86/WikiDocs/issues/256 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/Zavy86/WikiDocs/issues/256#issue-3201516458 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/Zavy86/WikiDocs/issues/256#issuecomment-3034714777 | Exploit Issue Tracking |
| https://vuldb.com/?ctiid.317002 | Permissions Required VDB Entry |
| https://vuldb.com/?id.317002 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.609063 | Exploit Third Party Advisory VDB Entry |
| https://github.com/Zavy86/WikiDocs/issues/256 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/Zavy86/WikiDocs/issues/256#issue-3201516458 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/Zavy86/WikiDocs/issues/256#issuecomment-3034714777 | Exploit Issue Tracking |
Configurations
History
No history.
Information
Published : 2025-07-20 12:15
Updated : 2025-09-15 18:40
NVD link : CVE-2025-7887
Mitre link : CVE-2025-7887
CVE.ORG link : CVE-2025-7887
JSON object : View
Products Affected
wikidocs
- wikidocs
