Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
requarks wiki.js vulnerabilities and exploits
(subscribe to this query)
312
VMScore
CVE-2021-25993
In Requarks wiki.js, versions 2.0.0-beta.147 to 2.5.255 are affected by Stored XSS vulnerability, where a low privileged (editor) user can upload a SVG file that contains malicious JavaScript while uploading assets in the page. That will send the JWT tokens to the attacker’...
Requarks Wiki.js 2.0.0
Requarks Wiki.js
383
VMScore
CVE-2020-4052
In Wiki.js prior to 2.4.107, there is a stored cross-site scripting through template injection. This vulnerability exists due to an insecure validation mechanism intended to insert v-pre tags into rendered HTML elements which contain curly-braces. By creating a crafted wiki page,...
Requarks Wiki.js
312
VMScore
CVE-2022-23654
Wiki.js is a wiki app built on Node.js. In affected versions an authenticated user with write access on a restricted set of paths can update a page outside the allowed paths by specifying a different target page ID while keeping the path intact. The access control incorrectly che...
Requarks Wiki.js
445
VMScore
CVE-2020-15236
In Wiki.js before version 2.5.151, directory traversal outside of Wiki.js context is possible when a storage module with local asset cache fetching is enabled. A malicious user can potentially read any file on the file system by crafting a special URL that allows for directory tr...
Requarks Wiki.js
312
VMScore
CVE-2020-15274
In Wiki.js before version 2.5.162, an XSS payload can be injected in a page title and executed via the search results. While the title is properly escaped in both the navigation links and the actual page title, it is not the case in the search results. Commit a57d9af34c15adbf460d...
Requarks Wiki.js
312
VMScore
CVE-2021-43842
Wiki.js is a wiki app built on Node.js. Wiki.js versions 2.5.257 and previous versions are vulnerable to stored cross-site scripting through a SVG file upload. By creating a crafted SVG file, a malicious Wiki.js user may stage a stored cross-site scripting attack. This allows the...
Requarks Wiki.js
312
VMScore
CVE-2021-43855
Wiki.js is a wiki app built on node.js. Wiki.js 2.5.263 and previous versions is vulnerable to stored cross-site scripting through a SVG file upload made via a custom request with a fake MIME type. By creating a crafted SVG file, a malicious Wiki.js user may stage a stored cross-...
Requarks Wiki.js
312
VMScore
CVE-2021-43856
Wiki.js is a wiki app built on Node.js. Wiki.js 2.5.263 and previous versions is vulnerable to stored cross-site scripting through non-image file uploads for file types that can be viewed directly inline in the browser. By creating a malicious file which can execute inline JS whe...
Requarks Wiki.js
383
VMScore
CVE-2021-43800
Wiki.js is a wiki app built on Node.js. Prior to version 2.5.254, directory traversal outside of Wiki.js context is possible when a storage module with local asset cache fetching is enabled on a Windows host. A malicious user can potentially read any file on the file system by cr...
Requarks Wiki.js
801
VMScore
CVE-2022-1681
Authentication Bypass Using an Alternate Path or Channel in GitHub repository requarks/wiki before 2.5.281. User can get root user permissions
Requarks Wiki.js
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »