Description
An issue was discovered in Kiamo before 8.4 allowing authenticated administrative attackers to execute arbitrary PHP code on the server. NOTE: the Supplier's position is that this is "a historical and intended administrative feature of the product, accessible only to already authenticated users explicitly granted administrator privileges." However, restrictions on some PHP functions were added in 8.4.
Published: 2026-04-09
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via PHP
Action: Immediate Patch
AI Analysis

Impact

An issue in Kiamo before version 8.4 allows an attacker who is already authenticated as an administrator to execute arbitrary PHP code on the server, which is a direct remote code execution flaw (CWE‑94). Based on the description, it is inferred that executing arbitrary PHP would allow the attacker to read, modify, or delete any files accessible to the web server, thereby compromising data confidentiality, integrity, and potentially the underlying operating system. The vendor acknowledges this as a historical administrative feature, accessible only to users with explicit admin privileges, and notes that restrictions on certain PHP functions were added in version 8.4.

Affected Systems

All Kiamo installations running a version earlier than 8.4 are affected. No other products or versions are listed as impacted.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity vulnerability. The EPSS score of less than 1% suggests that exploitation is currently unlikely, and the vulnerability is not included in CISA’s KEV catalog. Exploitation requires the attacker to be authenticated as an administrator, meaning a prior compromise of administrative credentials is necessary before the arbitrary code can be executed.

Generated by OpenCVE AI on April 27, 2026 at 19:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Kiamo to version 8.4 or later
  • Verify that restrictions on PHP functions are enabled in version 8.4
  • Revoke unnecessary administrator privileges and enforce least privilege

Generated by OpenCVE AI on April 27, 2026 at 19:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Administrative RCE via Arbitrary PHP Execution in Kiamo <8.4

Wed, 22 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Kiamo before 8.4 allowing authenticated administrative attackers to execute arbitrary PHP code on the server. An issue was discovered in Kiamo before 8.4 allowing authenticated administrative attackers to execute arbitrary PHP code on the server. NOTE: the Supplier's position is that this is "a historical and intended administrative feature of the product, accessible only to already authenticated users explicitly granted administrator privileges." However, restrictions on some PHP functions were added in 8.4.

Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Title Authenticated Admin Arbitrary PHP Code Execution in Kiamo Prior to v8.4

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Title Authenticated Admin Arbitrary PHP Code Execution in Kiamo Prior to v8.4

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Kiamo
Kiamo kiamo
Vendors & Products Kiamo
Kiamo kiamo

Thu, 09 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Kiamo before 8.4 allowing authenticated administrative attackers to execute arbitrary PHP code on the server.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-22T14:47:51.482Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-70364

cve-icon Vulnrichment

Updated: 2026-04-14T14:51:55.015Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-09T16:16:25.573

Modified: 2026-04-22T15:16:12.357

Link: CVE-2025-70364

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T20:00:05Z

Weaknesses