CVE-2024-46879: n/a
CVE-2024-46879 is a reflected Cross-Site Scripting (XSS) vulnerability in the POST parameter zipPath of tiki-admin_system. php in Tiki CMS version 21. 2. An attacker can craft malicious JavaScript code that is reflected back to the user, potentially leading to unauthorized actions or access to sensitive information. Exploitation requires the victim to interact with a malicious link or payload, and the attacker must have at least low privileges on the system. The vulnerability impacts confidentiality and integrity but does not affect availability. No public exploits are currently known. The CVSS score is 5. 4 (medium severity), reflecting the need for user interaction and limited privileges required. Organizations using Tiki CMS 21.
AI Analysis
Technical Summary
CVE-2024-46879 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the Tiki CMS version 21.2, specifically within the POST request parameter zipPath of the tiki-admin_system.php script. Reflected XSS occurs when untrusted input is immediately returned in the HTTP response without proper sanitization or encoding, allowing attackers to inject arbitrary JavaScript code. In this case, an attacker crafts a malicious payload embedded in the zipPath parameter, which when processed by the vulnerable script, reflects the payload back to the user's browser. This enables execution of arbitrary JavaScript in the context of the victim's session. The vulnerability requires the attacker to have at least low-level privileges (PR:L) and user interaction (UI:R), such as convincing a user to click a crafted link or submit a malicious form. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component, potentially impacting the entire user session or application state. The CVSS vector indicates network attack vector (AV:N), low attack complexity (AC:L), and no impact on availability (A:N), but with limited confidentiality (C:L) and integrity (I:L) impacts. This vulnerability can lead to theft of session cookies, unauthorized actions performed on behalf of the user, or exposure of sensitive information accessible within the user's session. No known public exploits or patches are currently available, emphasizing the need for proactive mitigation. The root cause is improper input validation and output encoding in the handling of the zipPath POST parameter, a common weakness categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
The primary impact of CVE-2024-46879 is on the confidentiality and integrity of user sessions within Tiki CMS installations running version 21.2. Successful exploitation allows attackers to execute arbitrary JavaScript code in the victim's browser, potentially leading to session hijacking, theft of sensitive data, or unauthorized actions such as changing settings or accessing restricted content. While availability is not directly affected, the compromise of administrative or privileged user accounts could lead to further attacks or data breaches. Organizations using Tiki CMS for content management, especially those with sensitive or confidential data, face risks of data leakage and unauthorized modifications. The requirement for user interaction and low privileges reduces the ease of exploitation but does not eliminate risk, particularly in environments with many users or where social engineering is feasible. The lack of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a significant threat if weaponized. Failure to address this vulnerability could lead to reputational damage, regulatory non-compliance, and operational disruptions in affected organizations.
Mitigation Recommendations
To mitigate CVE-2024-46879, organizations should first verify if they are running Tiki CMS version 21.2 and restrict access to the tiki-admin_system.php endpoint to trusted users only. Since no official patch is currently available, administrators should implement input validation and output encoding on the zipPath POST parameter to neutralize potentially malicious scripts. Employing a Web Application Firewall (WAF) with rules targeting reflected XSS payloads can provide an additional layer of defense. Educate users and administrators about the risks of clicking untrusted links or submitting suspicious forms to reduce the likelihood of successful social engineering. Enforce the principle of least privilege to limit the impact of compromised accounts. Monitor logs for unusual POST requests to tiki-admin_system.php and anomalous user activity that may indicate exploitation attempts. Once an official patch or update is released by Tiki CMS maintainers, apply it promptly. Additionally, consider implementing Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, Japan, India, Brazil
CVE-2024-46879: n/a
Description
CVE-2024-46879 is a reflected Cross-Site Scripting (XSS) vulnerability in the POST parameter zipPath of tiki-admin_system. php in Tiki CMS version 21. 2. An attacker can craft malicious JavaScript code that is reflected back to the user, potentially leading to unauthorized actions or access to sensitive information. Exploitation requires the victim to interact with a malicious link or payload, and the attacker must have at least low privileges on the system. The vulnerability impacts confidentiality and integrity but does not affect availability. No public exploits are currently known. The CVSS score is 5. 4 (medium severity), reflecting the need for user interaction and limited privileges required. Organizations using Tiki CMS 21.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-46879 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the Tiki CMS version 21.2, specifically within the POST request parameter zipPath of the tiki-admin_system.php script. Reflected XSS occurs when untrusted input is immediately returned in the HTTP response without proper sanitization or encoding, allowing attackers to inject arbitrary JavaScript code. In this case, an attacker crafts a malicious payload embedded in the zipPath parameter, which when processed by the vulnerable script, reflects the payload back to the user's browser. This enables execution of arbitrary JavaScript in the context of the victim's session. The vulnerability requires the attacker to have at least low-level privileges (PR:L) and user interaction (UI:R), such as convincing a user to click a crafted link or submit a malicious form. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component, potentially impacting the entire user session or application state. The CVSS vector indicates network attack vector (AV:N), low attack complexity (AC:L), and no impact on availability (A:N), but with limited confidentiality (C:L) and integrity (I:L) impacts. This vulnerability can lead to theft of session cookies, unauthorized actions performed on behalf of the user, or exposure of sensitive information accessible within the user's session. No known public exploits or patches are currently available, emphasizing the need for proactive mitigation. The root cause is improper input validation and output encoding in the handling of the zipPath POST parameter, a common weakness categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
The primary impact of CVE-2024-46879 is on the confidentiality and integrity of user sessions within Tiki CMS installations running version 21.2. Successful exploitation allows attackers to execute arbitrary JavaScript code in the victim's browser, potentially leading to session hijacking, theft of sensitive data, or unauthorized actions such as changing settings or accessing restricted content. While availability is not directly affected, the compromise of administrative or privileged user accounts could lead to further attacks or data breaches. Organizations using Tiki CMS for content management, especially those with sensitive or confidential data, face risks of data leakage and unauthorized modifications. The requirement for user interaction and low privileges reduces the ease of exploitation but does not eliminate risk, particularly in environments with many users or where social engineering is feasible. The lack of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a significant threat if weaponized. Failure to address this vulnerability could lead to reputational damage, regulatory non-compliance, and operational disruptions in affected organizations.
Mitigation Recommendations
To mitigate CVE-2024-46879, organizations should first verify if they are running Tiki CMS version 21.2 and restrict access to the tiki-admin_system.php endpoint to trusted users only. Since no official patch is currently available, administrators should implement input validation and output encoding on the zipPath POST parameter to neutralize potentially malicious scripts. Employing a Web Application Firewall (WAF) with rules targeting reflected XSS payloads can provide an additional layer of defense. Educate users and administrators about the risks of clicking untrusted links or submitting suspicious forms to reduce the likelihood of successful social engineering. Enforce the principle of least privilege to limit the impact of compromised accounts. Monitor logs for unusual POST requests to tiki-admin_system.php and anomalous user activity that may indicate exploitation attempts. Once an official patch or update is released by Tiki CMS maintainers, apply it promptly. Additionally, consider implementing Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2024-09-12T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69c1986ff4197a8e3b86e7b6
Added to database: 3/23/2026, 7:45:51 PM
Last enriched: 3/30/2026, 8:34:12 PM
Last updated: 5/8/2026, 4:09:55 PM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.