CVE-2025-34111: CWE-434 Unrestricted Upload of File with Dangerous Type in Tiki Software Community Association Wiki CMS Groupware
An unauthenticated arbitrary file upload vulnerability exists in Tiki Wiki CMS Groupware version 15.1 and earlier via the ELFinder component's default connector (connector.minimal.php), which allows remote attackers to upload and execute malicious PHP scripts in the context of the web server. The vulnerable component does not enforce file type validation, allowing attackers to craft a POST request to upload executable PHP payloads through the ELFinder interface exposed at /vendor_extra/elfinder/.
AI Analysis
Technical Summary
CVE-2025-34111 is a critical unauthenticated arbitrary file upload vulnerability affecting Tiki Wiki CMS Groupware version 15.1 and earlier. The vulnerability resides in the ELFinder component's default connector (connector.minimal.php), which is exposed at the path /vendor_extra/elfinder/. This component fails to enforce proper file type validation, allowing remote attackers to upload malicious files, including executable PHP scripts, without authentication. By crafting a specially designed POST request to the ELFinder interface, an attacker can upload and execute arbitrary PHP code on the web server hosting the vulnerable Tiki Wiki CMS Groupware instance. This leads to a complete compromise of the affected system, as the attacker can execute commands with the privileges of the web server process. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), CWE-306 (Missing Authentication for Critical Function), and CWE-20 (Improper Input Validation). The CVSS 4.0 base score is 9.3 (critical), reflecting its network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No known public exploits have been reported yet, but the severity and ease of exploitation make it a significant threat. The vulnerability affects all versions up to 15.1, indicating a broad scope of potentially impacted deployments. Since the ELFinder connector is commonly used for file management within Tiki CMS, the exposure of this interface without authentication is a critical security oversight. Attackers leveraging this vulnerability can gain persistent remote code execution, enabling data theft, defacement, lateral movement, or establishment of backdoors.
Potential Impact
For European organizations using Tiki Wiki CMS Groupware, this vulnerability poses a severe risk. Many public sector entities, educational institutions, and community organizations in Europe utilize open-source CMS platforms like Tiki for collaboration and content management. A successful exploit could lead to unauthorized access to sensitive data, disruption of services, and potential spread of malware within organizational networks. Given the unauthenticated nature of the exploit, attackers can target vulnerable systems remotely without prior access, increasing the likelihood of widespread exploitation. The impact extends to confidentiality breaches (exfiltration of sensitive documents), integrity violations (alteration or deletion of content), and availability disruptions (defacement or denial of service). Additionally, compromised systems could be leveraged as pivot points for further attacks against internal infrastructure or supply chain partners. The lack of authentication and input validation also means automated scanning and exploitation tools could be developed rapidly, increasing the threat to European organizations that have not patched or mitigated this vulnerability. The critical CVSS score underscores the urgency for European entities to address this issue promptly to avoid operational and reputational damage.
Mitigation Recommendations
1. Immediate upgrade: Organizations should upgrade Tiki Wiki CMS Groupware to a version beyond 15.1 once an official patch addressing CVE-2025-34111 is released by the Tiki Software Community Association. 2. Temporary access restrictions: Until a patch is available, restrict access to the /vendor_extra/elfinder/ directory using web server configuration (e.g., IP whitelisting, authentication requirements, or disabling the ELFinder connector if not in use). 3. Web application firewall (WAF): Deploy and configure a WAF to detect and block suspicious POST requests targeting the ELFinder interface, especially those attempting to upload PHP or other executable files. 4. File upload validation: Implement additional server-side validation to restrict allowed file types and enforce strict content-type checks, preventing execution of uploaded scripts. 5. Monitoring and logging: Enable detailed logging of file upload activities and monitor for anomalous behavior or unexpected file creations within the web root. 6. Incident response readiness: Prepare to isolate and remediate compromised systems quickly, including forensic analysis and restoration from clean backups. 7. Network segmentation: Limit the web server’s access to internal resources to reduce potential lateral movement in case of compromise. 8. Disable unnecessary components: If ELFinder is not required, disable or remove it entirely to reduce the attack surface. These measures, combined with timely patching, will significantly reduce the risk posed by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-34111: CWE-434 Unrestricted Upload of File with Dangerous Type in Tiki Software Community Association Wiki CMS Groupware
Description
An unauthenticated arbitrary file upload vulnerability exists in Tiki Wiki CMS Groupware version 15.1 and earlier via the ELFinder component's default connector (connector.minimal.php), which allows remote attackers to upload and execute malicious PHP scripts in the context of the web server. The vulnerable component does not enforce file type validation, allowing attackers to craft a POST request to upload executable PHP payloads through the ELFinder interface exposed at /vendor_extra/elfinder/.
AI-Powered Analysis
Technical Analysis
CVE-2025-34111 is a critical unauthenticated arbitrary file upload vulnerability affecting Tiki Wiki CMS Groupware version 15.1 and earlier. The vulnerability resides in the ELFinder component's default connector (connector.minimal.php), which is exposed at the path /vendor_extra/elfinder/. This component fails to enforce proper file type validation, allowing remote attackers to upload malicious files, including executable PHP scripts, without authentication. By crafting a specially designed POST request to the ELFinder interface, an attacker can upload and execute arbitrary PHP code on the web server hosting the vulnerable Tiki Wiki CMS Groupware instance. This leads to a complete compromise of the affected system, as the attacker can execute commands with the privileges of the web server process. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), CWE-306 (Missing Authentication for Critical Function), and CWE-20 (Improper Input Validation). The CVSS 4.0 base score is 9.3 (critical), reflecting its network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No known public exploits have been reported yet, but the severity and ease of exploitation make it a significant threat. The vulnerability affects all versions up to 15.1, indicating a broad scope of potentially impacted deployments. Since the ELFinder connector is commonly used for file management within Tiki CMS, the exposure of this interface without authentication is a critical security oversight. Attackers leveraging this vulnerability can gain persistent remote code execution, enabling data theft, defacement, lateral movement, or establishment of backdoors.
Potential Impact
For European organizations using Tiki Wiki CMS Groupware, this vulnerability poses a severe risk. Many public sector entities, educational institutions, and community organizations in Europe utilize open-source CMS platforms like Tiki for collaboration and content management. A successful exploit could lead to unauthorized access to sensitive data, disruption of services, and potential spread of malware within organizational networks. Given the unauthenticated nature of the exploit, attackers can target vulnerable systems remotely without prior access, increasing the likelihood of widespread exploitation. The impact extends to confidentiality breaches (exfiltration of sensitive documents), integrity violations (alteration or deletion of content), and availability disruptions (defacement or denial of service). Additionally, compromised systems could be leveraged as pivot points for further attacks against internal infrastructure or supply chain partners. The lack of authentication and input validation also means automated scanning and exploitation tools could be developed rapidly, increasing the threat to European organizations that have not patched or mitigated this vulnerability. The critical CVSS score underscores the urgency for European entities to address this issue promptly to avoid operational and reputational damage.
Mitigation Recommendations
1. Immediate upgrade: Organizations should upgrade Tiki Wiki CMS Groupware to a version beyond 15.1 once an official patch addressing CVE-2025-34111 is released by the Tiki Software Community Association. 2. Temporary access restrictions: Until a patch is available, restrict access to the /vendor_extra/elfinder/ directory using web server configuration (e.g., IP whitelisting, authentication requirements, or disabling the ELFinder connector if not in use). 3. Web application firewall (WAF): Deploy and configure a WAF to detect and block suspicious POST requests targeting the ELFinder interface, especially those attempting to upload PHP or other executable files. 4. File upload validation: Implement additional server-side validation to restrict allowed file types and enforce strict content-type checks, preventing execution of uploaded scripts. 5. Monitoring and logging: Enable detailed logging of file upload activities and monitor for anomalous behavior or unexpected file creations within the web root. 6. Incident response readiness: Prepare to isolate and remediate compromised systems quickly, including forensic analysis and restoration from clean backups. 7. Network segmentation: Limit the web server’s access to internal resources to reduce potential lateral movement in case of compromise. 8. Disable unnecessary components: If ELFinder is not required, disable or remove it entirely to reduce the attack surface. These measures, combined with timely patching, will significantly reduce the risk posed by this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.560Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687654a5a83201eaaccea526
Added to database: 7/15/2025, 1:16:21 PM
Last enriched: 7/15/2025, 1:32:03 PM
Last updated: 8/26/2025, 10:58:53 AM
Views: 33
Related Threats
CVE-2025-9670: Inefficient Regular Expression Complexity in mixmark-io turndown
MediumCVE-2025-9669: SQL Injection in Jinher OA
MediumCVE-2025-43773: CWE-862 Missing Authorization in Liferay Portal
MediumCVE-2025-9667: SQL Injection in code-projects Simple Grading System
MediumCVE-2025-9377: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. Archer C7(EU) V2
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.