Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Tue, 15 Jul 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 15 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 15 Jul 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 15 Jul 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An unauthenticated arbitrary file upload vulnerability exists in Tiki Wiki CMS Groupware version 15.1 and earlier via the ELFinder component's default connector (connector.minimal.php), which allows remote attackers to upload and execute malicious PHP scripts in the context of the web server. The vulnerable component does not enforce file type validation, allowing attackers to craft a POST request to upload executable PHP payloads through the ELFinder interface exposed at /vendor_extra/elfinder/. | |
Title | Tiki Wiki <= 15.1 ELFinder Unauthenticated File Upload RCE | |
Weaknesses | CWE-20 CWE-306 CWE-434 |
|
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-07-15T13:42:57.252Z
Reserved: 2025-04-15T19:15:22.560Z
Link: CVE-2025-34111

Updated: 2025-07-15T13:30:33.150Z

Status : Awaiting Analysis
Published: 2025-07-15T13:15:30.980
Modified: 2025-07-15T20:07:28.023
Link: CVE-2025-34111

No data.

No data.