Логотип exploitDog
bind:CVE-2025-34113
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-34113

Количество 3

Количество 3

nvd логотип

CVE-2025-34113

7 месяцев назад

An authenticated command injection vulnerability exists in Tiki Wiki CMS versions ≤14.1, ≤12.4 LTS, ≤9.10 LTS, and ≤6.14 via the `viewmode` GET parameter in `tiki-calendar.php`. When the calendar module is enabled and an authenticated user has permission to access it, an attacker can inject and execute arbitrary PHP code. Successful exploitation leads to remote code execution in the context of the web server user.

EPSS: Средний
debian логотип

CVE-2025-34113

7 месяцев назад

An authenticated command injection vulnerability exists in Tiki Wiki C ...

EPSS: Средний
github логотип

GHSA-mpf8-7ggf-mqcv

7 месяцев назад

An authenticated command injection vulnerability exists in Tiki Wiki CMS versions ≤14.1, ≤12.4 LTS, ≤9.10 LTS, and ≤6.14 via the `viewmode` GET parameter in `tiki-calendar.php`. When the calendar module is enabled and an authenticated user has permission to access it, an attacker can inject and execute arbitrary PHP code. Successful exploitation leads to remote code execution in the context of the web server user.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-34113

An authenticated command injection vulnerability exists in Tiki Wiki CMS versions ≤14.1, ≤12.4 LTS, ≤9.10 LTS, and ≤6.14 via the `viewmode` GET parameter in `tiki-calendar.php`. When the calendar module is enabled and an authenticated user has permission to access it, an attacker can inject and execute arbitrary PHP code. Successful exploitation leads to remote code execution in the context of the web server user.

40%
Средний
7 месяцев назад
debian логотип
CVE-2025-34113

An authenticated command injection vulnerability exists in Tiki Wiki C ...

40%
Средний
7 месяцев назад
github логотип
GHSA-mpf8-7ggf-mqcv

An authenticated command injection vulnerability exists in Tiki Wiki CMS versions ≤14.1, ≤12.4 LTS, ≤9.10 LTS, and ≤6.14 via the `viewmode` GET parameter in `tiki-calendar.php`. When the calendar module is enabled and an authenticated user has permission to access it, an attacker can inject and execute arbitrary PHP code. Successful exploitation leads to remote code execution in the context of the web server user.

40%
Средний
7 месяцев назад

Уязвимостей на страницу