<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>YesWiki — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/yeswiki/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 22 May 2026 15:40:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/yeswiki/feed.xml" rel="self" type="application/rss+xml"/><item><title>YesWiki Unauthenticated SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-yeswiki-sqli/</link><pubDate>Fri, 22 May 2026 15:40:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-yeswiki-sqli/</guid><description>YesWiki versions prior to 4.6.4 are vulnerable to an unauthenticated SQL injection in the Bazar form-import path (`FormManager::create()`), allowing an unauthenticated attacker to inject arbitrary SQL into an `INSERT` statement and read the full database, including `yeswiki_users.password` hashes (CVE-2026-46670).</description><content:encoded><![CDATA[<p>YesWiki is susceptible to an unauthenticated SQL injection vulnerability within the Bazar form-import functionality, specifically affecting versions prior to 4.6.4. The vulnerability resides in the <code>FormManager::create()</code> function, where unsanitized input is concatenated into an SQL INSERT statement. This allows any unauthenticated visitor to inject arbitrary SQL code and potentially extract sensitive information, including user credentials, from the database. The issue was identified and analyzed against commit <code>1f485c049db030b94c047ec219e63534ac81142e</code>. Exploitation is straightforward, requiring only a crafted HTTP POST request, making this a critical vulnerability for any publicly accessible YesWiki instance.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP POST request to the <code>/?BazaR&amp;vue=formulaire</code> endpoint.</li>
<li>The request contains a specially crafted <code>imported-form</code> parameter with SQL injection payload.</li>
<li>The <code>FormManager::create()</code> function (FormManager.php#L258) processes the request and concatenates the malicious input into an SQL INSERT statement without proper sanitization.</li>
<li>The injected SQL code executes within the context of the YesWiki database.</li>
<li>The attacker uses the SQL injection to extract data from the <code>yeswiki_users</code> table, including email addresses and password hashes.</li>
<li>The extracted data is encoded and embedded within the <code>bn_id_nature</code> field of a newly created database entry.</li>
<li>The attacker then sends a request to <code>/?api/forms</code> to retrieve the <code>bn_id_nature</code> field.</li>
<li>The attacker decodes the extracted data to obtain sensitive information, such as usernames, emails, and password hashes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-46670) allows an unauthenticated attacker to dump the entire YesWiki database. This includes sensitive information such as usernames, email addresses, and, most critically, hashed passwords of all users. This complete data breach can lead to account compromise, unauthorized access to sensitive wiki content, and potential lateral movement within the organization if users reuse passwords across multiple services. The impact is particularly severe given the ease of exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade YesWiki to version 4.6.4 or later to patch the SQL injection vulnerability in <code>FormManager::create()</code> (reference: GHSA-jwvv-qr7q-cv8j).</li>
<li>Deploy the Sigma rule &ldquo;Detect YesWiki Unauthenticated SQL Injection Attempt&rdquo; to detect exploitation attempts against the vulnerable endpoint.</li>
<li>Monitor web server logs for POST requests to <code>/?BazaR&amp;vue=formulaire</code> with suspicious characters in the <code>imported-form</code> parameter (reference: sample HTTP request in the content).</li>
<li>Apply the Sigma rule &ldquo;Detect YesWiki Data Exfiltration via API&rdquo; to detect attempts to retrieve encoded data using the <code>/?api/forms</code> endpoint after successful SQL injection.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>yeswiki</category></item></channel></rss>