CVE-2025-24019
PHP vulnerability analysis and mitigation

Overview

YesWiki, a PHP-based wiki system, contains a vulnerability (CVE-2025-24019) in versions up to and including 4.4.5. The vulnerability allows any authenticated user to delete arbitrary files owned by the FastCGI Process Manager (FPM) user on the host system through the filemanager functionality, without any limitation on the filesystem's scope (GitHub Advisory).

Technical details

The vulnerability exists in the filemanager functionality, specifically in the fmErase() function within tools/attach/libs/attach.lib.php. The function fails to properly sanitize or verify the file path provided by users, allowing deletion of files through the unlink() function. Additionally, the fmDelete() function is also affected, enabling users to delete files attached to any existing wiki page, regardless of ownership (GitHub Advisory). The vulnerability has been assigned a CVSS score of 7.1, indicating high severity.

Impact

This vulnerability allows authenticated users to arbitrarily remove content from the Wiki, resulting in partial loss of data and website defacement. In standard installations where the www-data user owns the PHP files, attackers could potentially delete critical system files like index.php or core YesWiki files, completely disrupting access to the wiki. While container installations typically have different user ownership (root vs. www-data), the risk remains significant for standard deployments (GitHub Advisory).

Mitigation and workarounds

Version 4.5.0 contains a patch for this issue. The fix includes restricting the possible paths of fmErase() to the upload_path directory and ensuring that the filename ends with a trash date pattern before deletion. For systems that cannot immediately update, it is recommended to ensure proper file ownership and permissions are set to limit the scope of potential damage (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13828CRITICAL9
  • PHPPHP
  • mautic/core
NoYesDec 02, 2025
CVE-2025-13827HIGH8.8
  • PHPPHP
  • mautic/grapes-js-builder-bundle
NoYesDec 02, 2025
CVE-2025-66312MEDIUM6.2
  • PHPPHP
  • getgrav/grav
NoYesDec 01, 2025
CVE-2025-66311MEDIUM6.2
  • PHPPHP
  • getgrav/grav
NoYesDec 01, 2025
CVE-2025-66310MEDIUM6.2
  • PHPPHP
  • getgrav/grav
NoYesDec 01, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management