CVE-2025-34113: CWE-306 Missing Authentication for Critical Function in Tiki Software Community Association Wiki CMS Groupware
CVE-2025-34113 is a high-severity authenticated command injection vulnerability in Tiki Wiki CMS Groupware versions up to 14. 1, 12. 4 LTS, 9. 10 LTS, and 6. 14. It occurs via the 'viewmode' GET parameter in tiki-calendar. php when the calendar module is enabled and an authenticated user with access permissions interacts with it. Exploitation allows injection and execution of arbitrary PHP code in the web server context, leading to remote code execution without requiring user interaction. The vulnerability stems from missing authentication checks for critical functions and improper input validation, classified under CWE-306, CWE-20, and CWE-78. No public exploits are known yet, but the CVSS 4.
AI Analysis
Technical Summary
CVE-2025-34113 is an authenticated command injection vulnerability affecting multiple versions of the Tiki Wiki CMS Groupware, specifically versions ≤14.1, ≤12.4 LTS, ≤9.10 LTS, and ≤6.14. The flaw exists in the 'tiki-calendar.php' script, particularly in the handling of the 'viewmode' GET parameter when the calendar module is enabled. An authenticated user with permission to access the calendar can manipulate this parameter to inject arbitrary PHP code. This occurs due to missing authentication checks on critical functions (CWE-306), improper input validation (CWE-20), and unsafe command execution (CWE-78). The vulnerability enables remote code execution (RCE) in the context of the web server user, potentially allowing attackers to execute arbitrary commands, escalate privileges, or pivot within the affected environment. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no additional privileges required beyond authentication (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although no known exploits are currently in the wild, the vulnerability's characteristics make it a critical risk for organizations relying on Tiki Wiki CMS for collaboration and content management. The lack of available patches at the time of disclosure necessitates immediate attention to alternative mitigations.
Potential Impact
The impact of CVE-2025-34113 is significant for organizations using affected versions of Tiki Wiki CMS Groupware. Successful exploitation results in remote code execution with the privileges of the web server user, enabling attackers to execute arbitrary PHP code. This can lead to full system compromise, data theft, unauthorized access to sensitive information, defacement, or use of the compromised server as a pivot point for further attacks within the network. The vulnerability affects confidentiality, integrity, and availability of the affected systems. Since the vulnerability requires only authenticated access with calendar permissions, insider threats or compromised user credentials can be leveraged to exploit it. The widespread use of Tiki Wiki CMS in various sectors including education, government, and enterprises increases the risk of targeted attacks. Without timely mitigation, organizations face risks of operational disruption, reputational damage, and regulatory non-compliance due to data breaches.
Mitigation Recommendations
To mitigate CVE-2025-34113, organizations should immediately restrict access to the calendar module to only trusted users and review user permissions to minimize the number of users with calendar access. Network segmentation and web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting the 'viewmode' parameter. Monitoring logs for unusual parameter values or unexpected PHP execution can help detect exploitation attempts. Until official patches are released, consider disabling the calendar module if feasible to eliminate the attack surface. Implement strict input validation and sanitization on all user-supplied parameters, especially those used in command execution contexts. Employ multi-factor authentication (MFA) to reduce the risk of credential compromise. Regularly update and audit user privileges and credentials. Finally, maintain an incident response plan to quickly contain and remediate any exploitation.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, Brazil, India, Japan
CVE-2025-34113: CWE-306 Missing Authentication for Critical Function in Tiki Software Community Association Wiki CMS Groupware
Description
CVE-2025-34113 is a high-severity authenticated command injection vulnerability in Tiki Wiki CMS Groupware versions up to 14. 1, 12. 4 LTS, 9. 10 LTS, and 6. 14. It occurs via the 'viewmode' GET parameter in tiki-calendar. php when the calendar module is enabled and an authenticated user with access permissions interacts with it. Exploitation allows injection and execution of arbitrary PHP code in the web server context, leading to remote code execution without requiring user interaction. The vulnerability stems from missing authentication checks for critical functions and improper input validation, classified under CWE-306, CWE-20, and CWE-78. No public exploits are known yet, but the CVSS 4.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-34113 is an authenticated command injection vulnerability affecting multiple versions of the Tiki Wiki CMS Groupware, specifically versions ≤14.1, ≤12.4 LTS, ≤9.10 LTS, and ≤6.14. The flaw exists in the 'tiki-calendar.php' script, particularly in the handling of the 'viewmode' GET parameter when the calendar module is enabled. An authenticated user with permission to access the calendar can manipulate this parameter to inject arbitrary PHP code. This occurs due to missing authentication checks on critical functions (CWE-306), improper input validation (CWE-20), and unsafe command execution (CWE-78). The vulnerability enables remote code execution (RCE) in the context of the web server user, potentially allowing attackers to execute arbitrary commands, escalate privileges, or pivot within the affected environment. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no additional privileges required beyond authentication (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although no known exploits are currently in the wild, the vulnerability's characteristics make it a critical risk for organizations relying on Tiki Wiki CMS for collaboration and content management. The lack of available patches at the time of disclosure necessitates immediate attention to alternative mitigations.
Potential Impact
The impact of CVE-2025-34113 is significant for organizations using affected versions of Tiki Wiki CMS Groupware. Successful exploitation results in remote code execution with the privileges of the web server user, enabling attackers to execute arbitrary PHP code. This can lead to full system compromise, data theft, unauthorized access to sensitive information, defacement, or use of the compromised server as a pivot point for further attacks within the network. The vulnerability affects confidentiality, integrity, and availability of the affected systems. Since the vulnerability requires only authenticated access with calendar permissions, insider threats or compromised user credentials can be leveraged to exploit it. The widespread use of Tiki Wiki CMS in various sectors including education, government, and enterprises increases the risk of targeted attacks. Without timely mitigation, organizations face risks of operational disruption, reputational damage, and regulatory non-compliance due to data breaches.
Mitigation Recommendations
To mitigate CVE-2025-34113, organizations should immediately restrict access to the calendar module to only trusted users and review user permissions to minimize the number of users with calendar access. Network segmentation and web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting the 'viewmode' parameter. Monitoring logs for unusual parameter values or unexpected PHP execution can help detect exploitation attempts. Until official patches are released, consider disabling the calendar module if feasible to eliminate the attack surface. Implement strict input validation and sanitization on all user-supplied parameters, especially those used in command execution contexts. Employ multi-factor authentication (MFA) to reduce the risk of credential compromise. Regularly update and audit user privileges and credentials. Finally, maintain an incident response plan to quickly contain and remediate any exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.560Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687654a5a83201eaaccea53c
Added to database: 7/15/2025, 1:16:21 PM
Last enriched: 3/24/2026, 12:26:13 AM
Last updated: 3/24/2026, 8:27:28 PM
Views: 175
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.