YesWiki SQL Injection (CVE-2026-41143) Risks Data Exposure
The National Vulnerability Database reports a critical SQL injection vulnerability, CVE-2026-41143, within the YesWiki bazar module. This flaw, present in versions prior to 4.6.1, allows an attacker to inject malicious SQL queries directly into the database. Specifically, the $data['id_fiche'] value, sourced from user-controlled $_POST['id_fiche'], is concatenated into a raw SQL query without proper sanitization or parameterization in tools/bazar/services/EntryManager.php at line 704.
This vulnerability carries a high CVSS score of 8.8, indicating a severe risk. An attacker with low privileges could exploit this to achieve high impact on confidentiality, integrity, and availability. The direct concatenation of unsanitized input into SQL queries is a classic CWE-89 flaw, making exploitation straightforward for adversaries.
Defenders running YesWiki installations must prioritize patching to version 4.6.1 immediately. Failure to do so leaves sensitive data exposed to exfiltration and manipulation. The attacker’s calculus here is simple: find unpatched YesWiki instances, exploit the SQLi, and gain full database access with minimal effort.
What This Means For You
- If your organization uses YesWiki, check your version immediately. Patch to 4.6.1 without delay to remediate CVE-2026-41143. Assume any unpatched instance is actively vulnerable to data exfiltration and integrity compromise, and audit logs for unusual database activity.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
YesWiki Bazar Module SQL Injection Attempt (CVE-2026-41143)
title: YesWiki Bazar Module SQL Injection Attempt (CVE-2026-41143)
id: scw-2026-05-07-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit the SQL injection vulnerability in the YesWiki bazar module (CVE-2026-41143). This rule specifically looks for POST requests to EntryManager.php containing the 'id_fiche' parameter, which is known to be vulnerable. It also checks for common SQL injection payloads within the query string, indicating an exploit attempt.
author: SCW Feed Engine (AI-generated)
date: 2026-05-07
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-41143/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
uri|contains:
- '/tools/bazar/services/EntryManager.php'
cs-method:
- 'POST'
cs-uri-query|contains:
- 'id_fiche='
selection_payload:
cs-uri-query|contains:
- 'UNION SELECT'
- 'SLEEP('
- 'BENCHMARK('
- '@@version'
- 'database()'
condition: selection AND selection_payload
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41143 | SQLi | YesWiki bazar module prior to version 4.6.1 |
| CVE-2026-41143 | SQLi | YesWiki vulnerable file: tools/bazar/services/EntryManager.php |
| CVE-2026-41143 | SQLi | Vulnerable parameter: $_POST['id_fiche'] |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 07, 2026 at 09:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.