← Back to CVEs
CVE-2024-51478
CRITICAL9.9
Description
YesWiki is a wiki system written in PHP. Prior to 4.4.5, the use of a weak cryptographic algorithm and a hard-coded salt to hash the password reset key allows it to be recovered and used to reset the password of any account. This issue is fixed in 4.4.5.
CVE Details
CVSS v3.1 Score9.9
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published10/31/2024
Last Modified5/9/2025
Sourcenvd
Honeypot Sightings0
Affected Products
yeswiki:yeswiki
Weaknesses (CWE)
CWE-327
References
https://github.com/YesWiki/yeswiki/commit/b5a8f93b87720d5d5f033a4b3a131ce0fb621dbc(security-advisories@github.com)
https://github.com/YesWiki/yeswiki/commit/e1285709f6f6a2277bd0075acf369f33cefd78f7(security-advisories@github.com)
https://github.com/YesWiki/yeswiki/security/advisories/GHSA-4fvx-h823-38v3(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.