Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46878: n/a

0
High
VulnerabilityCVE-2024-46878cvecve-2024-46878
Published: Mon Mar 23 2026 (03/23/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-46878 is a Cross-Site Scripting (XSS) vulnerability found in the 'page' parameter of the tiki-editpage. php script in Tiki Wiki CMS versions 26. 3 and earlier. This flaw allows attackers to inject and execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to unauthorized actions or exposure of sensitive information. Exploitation requires no authentication but does require user interaction, such as visiting a maliciously crafted URL. No known exploits are currently reported in the wild. The vulnerability affects Tiki Wiki CMS installations worldwide, particularly where version 26. 3 or earlier is in use. Mitigation involves applying patches once available, or implementing strict input validation and output encoding on the affected parameter. Given the nature of XSS and the affected software's usage in collaborative environments, the severity is assessed as high.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 20:01:53 UTC

Technical Analysis

CVE-2024-46878 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the 'page' parameter of the tiki-editpage.php file within Tiki Wiki CMS versions 26.3 and earlier. This vulnerability arises due to insufficient sanitization or encoding of user-supplied input in the 'page' parameter, enabling attackers to inject malicious JavaScript code. When a victim accesses a crafted URL containing the malicious payload, the injected script executes in the victim's browser under the security context of the vulnerable web application. This can lead to session hijacking, theft of cookies or credentials, unauthorized actions performed on behalf of the user, or redirection to malicious sites. The vulnerability does not require authentication, increasing its risk profile, but exploitation depends on social engineering to lure users to the malicious link. No public exploits have been reported yet, and no official patches or CVSS scores have been published as of now. Tiki Wiki CMS is an open-source content management system used globally for collaborative content creation, making this vulnerability relevant to organizations relying on it for internal or public-facing knowledge bases and documentation. The lack of a CVSS score necessitates an expert severity assessment based on impact and exploitability factors.

Potential Impact

The impact of CVE-2024-46878 can be significant for organizations using vulnerable versions of Tiki Wiki CMS. Successful exploitation can compromise the confidentiality and integrity of user sessions and data by allowing attackers to execute arbitrary scripts in users' browsers. This can lead to theft of authentication tokens, unauthorized modification of content, or phishing attacks leveraging the trusted site context. Availability impact is generally low for XSS but could be indirectly affected if attackers use the vulnerability to inject disruptive scripts. Since Tiki Wiki CMS is often used for collaborative documentation and knowledge sharing, a breach could expose sensitive organizational information or disrupt workflows. The vulnerability's ease of exploitation without authentication and the potential for widespread user impact elevate the threat level. Organizations with public-facing Tiki installations are particularly at risk, as attackers can target any visitor. Internal deployments are also vulnerable if users access the system via browsers. The absence of known exploits suggests a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

To mitigate CVE-2024-46878, organizations should first monitor for official patches or updates from the Tiki Wiki CMS development team and apply them promptly once available. In the absence of patches, administrators can implement strict input validation and output encoding on the 'page' parameter to neutralize malicious scripts. Employing a Web Application Firewall (WAF) with rules to detect and block common XSS payloads targeting Tiki Wiki CMS can provide interim protection. Educating users about the risks of clicking unknown or suspicious links reduces the likelihood of successful social engineering exploitation. Additionally, enabling Content Security Policy (CSP) headers can restrict the execution of unauthorized scripts in browsers. Regular security audits and penetration testing focused on web application inputs can help identify and remediate similar issues. Finally, restricting access to the Tiki Wiki CMS to trusted networks or VPNs where feasible can limit exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-09-12T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c1986ff4197a8e3b86e7b1

Added to database: 3/23/2026, 7:45:51 PM

Last enriched: 3/23/2026, 8:01:53 PM

Last updated: 3/23/2026, 9:05:34 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses