Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46879: n/a

0
Medium
VulnerabilityCVE-2024-46879cvecve-2024-46879
Published: Mon Mar 23 2026 (03/23/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-46879 is a reflected Cross-Site Scripting (XSS) vulnerability in the POST parameter zipPath of tiki-admin_system. php in Tiki CMS version 21. 2. An attacker can craft malicious JavaScript code that is reflected back to the user, potentially leading to unauthorized actions or access to sensitive information. Exploitation requires the victim to interact with a malicious link or payload, and the attacker must have at least low privileges on the system. The vulnerability impacts confidentiality and integrity but does not affect availability. No public exploits are currently known. The CVSS score is 5. 4 (medium severity), reflecting the need for user interaction and limited privileges required. Organizations using Tiki CMS 21.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:34:12 UTC

Technical Analysis

CVE-2024-46879 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the Tiki CMS version 21.2, specifically within the POST request parameter zipPath of the tiki-admin_system.php script. Reflected XSS occurs when untrusted input is immediately returned in the HTTP response without proper sanitization or encoding, allowing attackers to inject arbitrary JavaScript code. In this case, an attacker crafts a malicious payload embedded in the zipPath parameter, which when processed by the vulnerable script, reflects the payload back to the user's browser. This enables execution of arbitrary JavaScript in the context of the victim's session. The vulnerability requires the attacker to have at least low-level privileges (PR:L) and user interaction (UI:R), such as convincing a user to click a crafted link or submit a malicious form. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component, potentially impacting the entire user session or application state. The CVSS vector indicates network attack vector (AV:N), low attack complexity (AC:L), and no impact on availability (A:N), but with limited confidentiality (C:L) and integrity (I:L) impacts. This vulnerability can lead to theft of session cookies, unauthorized actions performed on behalf of the user, or exposure of sensitive information accessible within the user's session. No known public exploits or patches are currently available, emphasizing the need for proactive mitigation. The root cause is improper input validation and output encoding in the handling of the zipPath POST parameter, a common weakness categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation).

Potential Impact

The primary impact of CVE-2024-46879 is on the confidentiality and integrity of user sessions within Tiki CMS installations running version 21.2. Successful exploitation allows attackers to execute arbitrary JavaScript code in the victim's browser, potentially leading to session hijacking, theft of sensitive data, or unauthorized actions such as changing settings or accessing restricted content. While availability is not directly affected, the compromise of administrative or privileged user accounts could lead to further attacks or data breaches. Organizations using Tiki CMS for content management, especially those with sensitive or confidential data, face risks of data leakage and unauthorized modifications. The requirement for user interaction and low privileges reduces the ease of exploitation but does not eliminate risk, particularly in environments with many users or where social engineering is feasible. The lack of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a significant threat if weaponized. Failure to address this vulnerability could lead to reputational damage, regulatory non-compliance, and operational disruptions in affected organizations.

Mitigation Recommendations

To mitigate CVE-2024-46879, organizations should first verify if they are running Tiki CMS version 21.2 and restrict access to the tiki-admin_system.php endpoint to trusted users only. Since no official patch is currently available, administrators should implement input validation and output encoding on the zipPath POST parameter to neutralize potentially malicious scripts. Employing a Web Application Firewall (WAF) with rules targeting reflected XSS payloads can provide an additional layer of defense. Educate users and administrators about the risks of clicking untrusted links or submitting suspicious forms to reduce the likelihood of successful social engineering. Enforce the principle of least privilege to limit the impact of compromised accounts. Monitor logs for unusual POST requests to tiki-admin_system.php and anomalous user activity that may indicate exploitation attempts. Once an official patch or update is released by Tiki CMS maintainers, apply it promptly. Additionally, consider implementing Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-09-12T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c1986ff4197a8e3b86e7b6

Added to database: 3/23/2026, 7:45:51 PM

Last enriched: 3/30/2026, 8:34:12 PM

Last updated: 5/8/2026, 4:09:55 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses