CVE-2025-31131: Yeswiki Path Traversal vulnerability allows arbitrary read of files
The squelette
parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. The payload ../../../../../../etc/passwd
was submitted in the squelette
parameter. The requested file was returned in the application’s response.
References
Code Behaviors & Features
Detect and mitigate CVE-2025-31131 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →