CVE-2025-34113

An authenticated command injection vulnerability exists in Tiki Wiki CMS versions ≤14.1, ≤12.4 LTS, ≤9.10 LTS, and ≤6.14 via the `viewmode` GET parameter in `tiki-calendar.php`. When the calendar module is enabled and an authenticated user has permission to access it, an attacker can inject and execute arbitrary PHP code. Successful exploitation leads to remote code execution in the context of the web server user.
CVSS

No CVSS.

Configurations

No configuration.

History

15 Jul 2025, 14:15

Type Values Removed Values Added
References
  • {'url': 'https://vulncheck/advisories/tiki-wiki-cms-authenticated-command-injection-in-calendar-module', 'source': 'disclosure@vulncheck.com'}
  • () https://www.vulncheck.com/advisories/tiki-wiki-cms-authenticated-command-injection-in-calendar-module -

15 Jul 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-15 13:15

Updated : 2025-07-15 20:07


NVD link : CVE-2025-34113

Mitre link : CVE-2025-34113

CVE.ORG link : CVE-2025-34113


JSON object : View

Products Affected

No product.

CWE
CWE-20

Improper Input Validation

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-306

Missing Authentication for Critical Function