CVE-2025-32461

9.9 CRITICAL

📋 TL;DR

CVE-2025-32461 is a critical remote code execution vulnerability in Tiki Wiki CMS where the wikiplugin_includetpl plugin improperly handles input passed to an eval() function. This allows authenticated users with edit permissions to execute arbitrary PHP code on the server. All Tiki installations before versions 21.12, 24.8, 27.2, and 28.3 are affected.

💻 Affected Systems

Products:
  • Tiki Wiki CMS Groupware
Versions: All versions before 21.12, 24.8, 27.2, and 28.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with edit permissions to wiki pages/templates.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise leading to data theft, malware deployment, lateral movement, and complete system takeover.

🟠

Likely Case

Authenticated attackers with edit permissions execute arbitrary code to steal sensitive data, deface websites, or install backdoors.

🟢

If Mitigated

With proper input validation and least privilege, impact is limited to the web application context, but still significant.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated due to direct eval() misuse.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.12, 24.8, 27.2, or 28.3

Vendor Advisory: https://gitlab.com/tikiwiki/tiki/-/commit/406bea4f6c379a23903ecfd55e538d90fd669ab0

Restart Required: No

Instructions:

1. Backup your Tiki installation and database. 2. Update to the appropriate fixed version: 21.12 for LTS 21.x, 24.8 for LTS 24.x, 27.2 for LTS 27.x, or 28.3 for main branch. 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable wikiplugin_includetpl

all

Temporarily disable the vulnerable plugin to prevent exploitation.

Edit Tiki configuration to remove or disable wikiplugin_includetpl functionality

Restrict edit permissions

all

Limit wiki edit permissions to only trusted administrators.

Review and tighten Tiki permission settings for wiki editing

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to Tiki instances.
  • Deploy web application firewall (WAF) rules to block eval() injection patterns and monitor for exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check Tiki version in admin panel or via tiki-version.php. If version is below 21.12, 24.8, 27.2, or 28.3, system is vulnerable.

Check Version:

Check Tiki admin panel or view source of tiki-version.php

Verify Fix Applied:

Confirm version is updated to 21.12, 24.8, 27.2, or 28.3 in admin panel and test wikiplugin_includetpl functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual eval() calls in PHP logs
  • Suspicious wikiplugin_includetpl usage patterns
  • Unexpected file writes or system commands

Network Indicators:

  • HTTP POST requests to wikiplugin_includetpl with unusual parameters
  • Outbound connections from web server to unexpected destinations

SIEM Query:

Search web server logs for 'wikiplugin_includetpl' with suspicious parameter values or eval patterns

🔗 References

📤 Share & Export