Impact
An unauthenticated arbitrary file upload flaw exists in the ELFinder component of Tiki Wiki CMS Groupware version 15.1 and earlier. The bolt‑on’s default connector does not enforce file type validation, which allows attackers to upload malicious PHP scripts through its /vendor_extra/elfinder/ interface. Once uploaded, the scripts execute in the context of the web server, giving the attacker full command execution privileges. The weakness is rooted in improper input validation (CWE‑20), missing authentication for the upload endpoint (CWE‑306), and lack of file type restriction (CWE‑434).
Affected Systems
Tiki Wiki CMS Groupware maintained by the Tiki Software Community Association is impacted when running version 15.1 or any earlier release, including the 12.9 series and older builds referenced by the CPE set. Users of these releases that expose the ELFinder connector at the /vendor_extra/elfinder/ path are vulnerable.
Risk and Exploitability
The reported CVSS score of 9.3 reflects the high severity, and the EPSS score of 74% indicates a high likelihood of exploitation in the wild. The flaw is not listed in CISA’s KEV catalog at this time. Based on the description, the likely attack vector is an unauthenticated HTTP POST request to the ELFinder upload endpoint, enabling attackers to place and run PHP files on the web server without needing credentials.
OpenCVE Enrichment
EUVD