Description
An authenticated command injection vulnerability exists in Tiki Wiki CMS versions ≤14.1, ≤12.4 LTS, ≤9.10 LTS, and ≤6.14 via the `viewmode` GET parameter in `tiki-calendar.php`. When the calendar module is enabled and an authenticated user has permission to access it, an attacker can inject and execute arbitrary PHP code. Successful exploitation leads to remote code execution in the context of the web server user.
Published: 2025-07-15
Score: 8.7 High
EPSS: 44.4% Moderate
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

An authenticated command injection vulnerability exists in the Calendar module of Tiki Wiki CMS. By manipulating the viewmode GET parameter in tiki-calendar.php, an attacker can inject arbitrary PHP code and execute it on the server as the web‑server user, giving full control of the affected system.

Affected Systems

The flaw affects all releases of Tiki Wiki CMS that include the calendar module and are version 14.1 or earlier, 12.4 LTS or earlier, 9.10 LTS or earlier, and 6.14 or earlier, supplied by the Tiki Software Community Association under the Wiki CMS Groupware umbrella.

Risk and Exploitability

The CVSS score of 8.7 marks the vulnerability as high severity while an EPSS score of 44% suggests that exploitation is likely in the wild. The issue requires authenticated access but the wide use of the Calendar component means many sites could be exposed. It is not yet listed in the CISA KEV catalog. Successful exploitation leads to remote code execution with the privileges of the web server, enabling total compromise of the host and further lateral attack vectors.

Generated by OpenCVE AI on April 28, 2026 at 11:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch or upgrade to the latest Tiki Wiki CMS release that removes the injection flaw.
  • Restrict calendar module access to only users who truly need it, thereby reducing the attack surface.
  • Perform a security audit to confirm that no other injection points exist and configure a web application firewall to block suspicious payloads.

Generated by OpenCVE AI on April 28, 2026 at 11:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-21426 An authenticated command injection vulnerability exists in Tiki Wiki CMS versions ≤14.1, ≤12.4 LTS, ≤9.10 LTS, and ≤6.14 via the `viewmode` GET parameter in `tiki-calendar.php`. When the calendar module is enabled and an authenticated user has permission to access it, an attacker can inject and execute arbitrary PHP code. Successful exploitation leads to remote code execution in the context of the web server user.
History

Fri, 28 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Tiki
Tiki tikiwiki Cms\/groupware
CPEs cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:*
Vendors & Products Tiki
Tiki tikiwiki Cms\/groupware

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00583}


Tue, 15 Jul 2025 14:30:00 +0000


Tue, 15 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 15 Jul 2025 14:00:00 +0000


Tue, 15 Jul 2025 13:15:00 +0000

Type Values Removed Values Added
Description An authenticated command injection vulnerability exists in Tiki Wiki CMS versions ≤14.1, ≤12.4 LTS, ≤9.10 LTS, and ≤6.14 via the `viewmode` GET parameter in `tiki-calendar.php`. When the calendar module is enabled and an authenticated user has permission to access it, an attacker can inject and execute arbitrary PHP code. Successful exploitation leads to remote code execution in the context of the web server user.
Title Tiki Wiki CMS Authenticated Command Injection in Calendar Module
Weaknesses CWE-20
CWE-306
CWE-78
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Tiki Tikiwiki Cms\/groupware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T14:09:39.387Z

Reserved: 2025-04-15T19:15:22.560Z

Link: CVE-2025-34113

cve-icon Vulnrichment

Updated: 2025-07-15T13:31:46.068Z

cve-icon NVD

Status : Deferred

Published: 2025-07-15T13:15:31.273

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-34113

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T11:15:26Z

Weaknesses