We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An authenticated command injection vulnerability exists in Tiki Wiki CMS versions ≤14.1, ≤12.4 LTS, ≤9.10 LTS, and ≤6.14 via the `viewmode` GET parameter in `tiki-calendar.php`. When the calendar module is enabled and an authenticated user has permission to access it, an attacker can inject and execute arbitrary PHP code. Successful exploitation leads to remote code execution in the context of the web server user.
Reserved 2025-04-15 | Published 2025-07-15 | Updated 2025-07-15 | Assigner VulnCheckCWE-306 Missing Authentication for Critical Function
CWE-20 Improper Input Validation
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Dany Ouellet
tiki.org/...-Important-Security-Fix-for-all-versions-of-Tiki
www.exploit-db.com/exploits/39965
raw.githubusercontent.com/...inux/http/tiki_calendar_exec.rb
www.acunetix.com/...mote-code-execution-via-calendar-module/
www.vulncheck.com/...ed-command-injection-in-calendar-module
Support options