Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Tue, 15 Jul 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 15 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 15 Jul 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 15 Jul 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An authenticated command injection vulnerability exists in Tiki Wiki CMS versions ≤14.1, ≤12.4 LTS, ≤9.10 LTS, and ≤6.14 via the `viewmode` GET parameter in `tiki-calendar.php`. When the calendar module is enabled and an authenticated user has permission to access it, an attacker can inject and execute arbitrary PHP code. Successful exploitation leads to remote code execution in the context of the web server user. | |
Title | Tiki Wiki CMS Authenticated Command Injection in Calendar Module | |
Weaknesses | CWE-20 CWE-306 CWE-78 |
|
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-07-15T13:42:26.936Z
Reserved: 2025-04-15T19:15:22.560Z
Link: CVE-2025-34113

Updated: 2025-07-15T13:31:46.068Z

Status : Awaiting Analysis
Published: 2025-07-15T13:15:31.273
Modified: 2025-07-15T20:07:28.023
Link: CVE-2025-34113

No data.

No data.