CVE-2025-7887

A vulnerability has been found in Zavy86 WikiDocs up to 1.0.78 and classified as problematic. This vulnerability affects unknown code of the file template.inc.php. The manipulation of the argument path leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/Zavy86/WikiDocs/issues/256 Exploit Issue Tracking Third Party Advisory
https://github.com/Zavy86/WikiDocs/issues/256#issue-3201516458 Exploit Issue Tracking Third Party Advisory
https://github.com/Zavy86/WikiDocs/issues/256#issuecomment-3034714777 Exploit Issue Tracking
https://vuldb.com/?ctiid.317002 Permissions Required VDB Entry
https://vuldb.com/?id.317002 Third Party Advisory VDB Entry
https://vuldb.com/?submit.609063 Exploit Third Party Advisory VDB Entry
https://github.com/Zavy86/WikiDocs/issues/256 Exploit Issue Tracking Third Party Advisory
https://github.com/Zavy86/WikiDocs/issues/256#issue-3201516458 Exploit Issue Tracking Third Party Advisory
https://github.com/Zavy86/WikiDocs/issues/256#issuecomment-3034714777 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:wikidocs:wikidocs:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-07-20 12:15

Updated : 2025-09-15 18:40


NVD link : CVE-2025-7887

Mitre link : CVE-2025-7887

CVE.ORG link : CVE-2025-7887


JSON object : View

Products Affected

wikidocs

  • wikidocs
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')