CVE-2025-34111: CWE-434 Unrestricted Upload of File with Dangerous Type in Tiki Software Community Association Wiki CMS Groupware
An unauthenticated arbitrary file upload vulnerability exists in Tiki Wiki CMS Groupware version 15.1 and earlier via the ELFinder component's default connector (connector.minimal.php), which allows remote attackers to upload and execute malicious PHP scripts in the context of the web server. The vulnerable component does not enforce file type validation, allowing attackers to craft a POST request to upload executable PHP payloads through the ELFinder interface exposed at /vendor_extra/elfinder/.
AI Analysis
Technical Summary
CVE-2025-34111 is a critical security vulnerability identified in Tiki Wiki CMS Groupware versions 15.1 and earlier. The flaw exists in the ELFinder file manager component, specifically in its default connector script (connector.minimal.php), which is exposed via the /vendor_extra/elfinder/ path. This connector fails to enforce any file type validation, allowing unauthenticated remote attackers to upload arbitrary files, including executable PHP scripts. By crafting a malicious POST request to the ELFinder interface, attackers can upload and execute PHP payloads on the web server hosting the vulnerable Tiki Wiki CMS instance. This leads to remote code execution (RCE) with the privileges of the web server user, potentially allowing full system compromise, data theft, or service disruption. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), CWE-306 (Missing Authentication for Critical Function), and CWE-20 (Improper Input Validation). The CVSS 4.0 base score is 9.3, reflecting the vulnerability's critical nature due to its network attack vector, lack of required authentication or user interaction, and high impact on confidentiality, integrity, and availability. No patches or official fixes were listed at the time of publication, and no known exploits have been reported in the wild yet, but the vulnerability is straightforward to exploit. The exposure of the ELFinder connector by default and its lack of file validation represent a significant security risk for any deployment of Tiki Wiki CMS Groupware that has not been updated or mitigated.
Potential Impact
For European organizations, this vulnerability poses a severe risk, particularly for those using Tiki Wiki CMS Groupware for internal collaboration, documentation, or public-facing websites. Successful exploitation allows attackers to execute arbitrary code on the web server, potentially leading to full system compromise, data breaches, defacement, or use of the server as a pivot point for further attacks within the network. Confidential information stored or processed by the CMS can be stolen or altered, impacting data integrity and privacy compliance obligations such as GDPR. Availability may also be affected if attackers deploy ransomware or disrupt services. Public sector entities, educational institutions, and enterprises relying on Tiki Wiki CMS for knowledge management are especially vulnerable. The lack of authentication requirement and ease of exploitation increase the likelihood of automated scanning and attacks. The absence of known exploits in the wild currently offers a window for proactive defense, but the critical severity demands immediate attention to prevent potential widespread exploitation across Europe.
Mitigation Recommendations
1. Immediately disable or restrict access to the ELFinder connector (connector.minimal.php) if it is not essential for operations, especially on public-facing servers. 2. Apply strict file upload validation controls, including whitelisting allowed file types and blocking executable extensions such as .php, .phtml, .php5, etc. 3. Upgrade Tiki Wiki CMS Groupware to the latest version once an official patch addressing this vulnerability is released by the vendor. 4. Implement web application firewall (WAF) rules to detect and block suspicious POST requests targeting the /vendor_extra/elfinder/ path or containing malicious payloads. 5. Conduct thorough audits of web server directories to identify and remove any unauthorized uploaded files. 6. Monitor logs for unusual activity related to file uploads or execution attempts. 7. Restrict web server permissions to limit the impact of any successful code execution, such as running the web server under a least-privilege user. 8. Educate administrators about the risks of exposing file manager components without proper security controls. 9. Consider network segmentation to isolate CMS servers from critical infrastructure. These measures collectively reduce the attack surface and limit the potential damage from exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-34111: CWE-434 Unrestricted Upload of File with Dangerous Type in Tiki Software Community Association Wiki CMS Groupware
Description
An unauthenticated arbitrary file upload vulnerability exists in Tiki Wiki CMS Groupware version 15.1 and earlier via the ELFinder component's default connector (connector.minimal.php), which allows remote attackers to upload and execute malicious PHP scripts in the context of the web server. The vulnerable component does not enforce file type validation, allowing attackers to craft a POST request to upload executable PHP payloads through the ELFinder interface exposed at /vendor_extra/elfinder/.
AI-Powered Analysis
Technical Analysis
CVE-2025-34111 is a critical security vulnerability identified in Tiki Wiki CMS Groupware versions 15.1 and earlier. The flaw exists in the ELFinder file manager component, specifically in its default connector script (connector.minimal.php), which is exposed via the /vendor_extra/elfinder/ path. This connector fails to enforce any file type validation, allowing unauthenticated remote attackers to upload arbitrary files, including executable PHP scripts. By crafting a malicious POST request to the ELFinder interface, attackers can upload and execute PHP payloads on the web server hosting the vulnerable Tiki Wiki CMS instance. This leads to remote code execution (RCE) with the privileges of the web server user, potentially allowing full system compromise, data theft, or service disruption. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), CWE-306 (Missing Authentication for Critical Function), and CWE-20 (Improper Input Validation). The CVSS 4.0 base score is 9.3, reflecting the vulnerability's critical nature due to its network attack vector, lack of required authentication or user interaction, and high impact on confidentiality, integrity, and availability. No patches or official fixes were listed at the time of publication, and no known exploits have been reported in the wild yet, but the vulnerability is straightforward to exploit. The exposure of the ELFinder connector by default and its lack of file validation represent a significant security risk for any deployment of Tiki Wiki CMS Groupware that has not been updated or mitigated.
Potential Impact
For European organizations, this vulnerability poses a severe risk, particularly for those using Tiki Wiki CMS Groupware for internal collaboration, documentation, or public-facing websites. Successful exploitation allows attackers to execute arbitrary code on the web server, potentially leading to full system compromise, data breaches, defacement, or use of the server as a pivot point for further attacks within the network. Confidential information stored or processed by the CMS can be stolen or altered, impacting data integrity and privacy compliance obligations such as GDPR. Availability may also be affected if attackers deploy ransomware or disrupt services. Public sector entities, educational institutions, and enterprises relying on Tiki Wiki CMS for knowledge management are especially vulnerable. The lack of authentication requirement and ease of exploitation increase the likelihood of automated scanning and attacks. The absence of known exploits in the wild currently offers a window for proactive defense, but the critical severity demands immediate attention to prevent potential widespread exploitation across Europe.
Mitigation Recommendations
1. Immediately disable or restrict access to the ELFinder connector (connector.minimal.php) if it is not essential for operations, especially on public-facing servers. 2. Apply strict file upload validation controls, including whitelisting allowed file types and blocking executable extensions such as .php, .phtml, .php5, etc. 3. Upgrade Tiki Wiki CMS Groupware to the latest version once an official patch addressing this vulnerability is released by the vendor. 4. Implement web application firewall (WAF) rules to detect and block suspicious POST requests targeting the /vendor_extra/elfinder/ path or containing malicious payloads. 5. Conduct thorough audits of web server directories to identify and remove any unauthorized uploaded files. 6. Monitor logs for unusual activity related to file uploads or execution attempts. 7. Restrict web server permissions to limit the impact of any successful code execution, such as running the web server under a least-privilege user. 8. Educate administrators about the risks of exposing file manager components without proper security controls. 9. Consider network segmentation to isolate CMS servers from critical infrastructure. These measures collectively reduce the attack surface and limit the potential damage from exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.560Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687654a5a83201eaaccea526
Added to database: 7/15/2025, 1:16:21 PM
Last enriched: 11/28/2025, 10:30:08 PM
Last updated: 12/4/2025, 4:09:47 AM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighCVE-2025-64055: n/a
UnknownCVE-2025-66404: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Flux159 mcp-server-kubernetes
MediumCVE-2025-66293: CWE-125: Out-of-bounds Read in pnggroup libpng
HighCVE-2025-65868: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.