CVE-2025-34111

An unauthenticated arbitrary file upload vulnerability exists in Tiki Wiki CMS Groupware version 15.1 and earlier via the ELFinder component's default connector (connector.minimal.php), which allows remote attackers to upload and execute malicious PHP scripts in the context of the web server. The vulnerable component does not enforce file type validation, allowing attackers to craft a POST request to upload executable PHP payloads through the ELFinder interface exposed at /vendor_extra/elfinder/.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:*

History

03 Oct 2025, 00:42

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de carga arbitraria de archivos no autenticados en Tiki Wiki CMS Groupware versión 15.1 y anteriores a través del conector predeterminado del componente ELFinder (connector.minimal.php). Esta vulnerabilidad permite a atacantes remotos cargar y ejecutar scripts PHP maliciosos en el servidor web. El componente vulnerable no aplica la validación del tipo de archivo, lo que permite a los atacantes manipular una solicitud POST para cargar cargas PHP ejecutables a través de la interfaz ELFinder expuesta en /vendor_extra/elfinder/.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/tikiwiki_upload_exec.rb - () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/tikiwiki_upload_exec.rb - Exploit, Third Party Advisory
References () https://tiki.org/article434-Security-update-Tiki-15-2-Tiki-14-4-and-Tiki-12-9-released - () https://tiki.org/article434-Security-update-Tiki-15-2-Tiki-14-4-and-Tiki-12-9-released - Release Notes
References () https://www.exploit-db.com/exploits/40091 - () https://www.exploit-db.com/exploits/40091 - Exploit, Third Party Advisory, VDB Entry
References () https://www.vulncheck.com/advisories/tiki-wiki-el-finder-unauthenticated-file-upload-rce - () https://www.vulncheck.com/advisories/tiki-wiki-el-finder-unauthenticated-file-upload-rce - Third Party Advisory
First Time Tiki tikiwiki Cms\/groupware
Tiki
CPE cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:*

15 Jul 2025, 14:15

Type Values Removed Values Added
References
  • {'url': 'https://vulncheck/advisories/tiki-wiki-el-finder-unauthenticated-file-upload-rce', 'source': 'disclosure@vulncheck.com'}
  • () https://www.vulncheck.com/advisories/tiki-wiki-el-finder-unauthenticated-file-upload-rce -

15 Jul 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-15 13:15

Updated : 2025-10-03 00:42


NVD link : CVE-2025-34111

Mitre link : CVE-2025-34111

CVE.ORG link : CVE-2025-34111


JSON object : View

Products Affected

tiki

  • tikiwiki_cms\/groupware
CWE
CWE-20

Improper Input Validation

CWE-306

Missing Authentication for Critical Function

CWE-434

Unrestricted Upload of File with Dangerous Type