Tiki
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Tiki product.
RSS Feeds for Tiki security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Tiki products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Tiki Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 0 vulnerabilities in Tiki. Last year, in 2025 Tiki had 3 security vulnerabilities published. Right now, Tiki is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 3 | 9.90 |
| 2024 | 5 | 0.00 |
| 2023 | 4 | 7.83 |
| 2022 | 0 | 0.00 |
| 2021 | 2 | 5.40 |
| 2020 | 3 | 8.37 |
| 2019 | 2 | 5.40 |
| 2018 | 7 | 0.00 |
It may take a day or so for new Tiki vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Tiki Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2025-34113 | Jul 15, 2025 |
Tiki Wiki CMS 14.1 Auth Command Injection via viewmode (CVE-2025-34113)An authenticated command injection vulnerability exists in Tiki Wiki CMS versions 14.1, 12.4 LTS, 9.10 LTS, and 6.14 via the `viewmode` GET parameter in `tiki-calendar.php`. When the calendar module is enabled and an authenticated user has permission to access it, an attacker can inject and execute arbitrary PHP code. Successful exploitation leads to remote code execution in the context of the web server user. |
|
| CVE-2025-34111 | Jul 15, 2025 |
Tiki Wiki CMS G/W 15.1- unauthed arbitrary file upload via ELFinderAn unauthenticated arbitrary file upload vulnerability exists in Tiki Wiki CMS Groupware version 15.1 and earlier via the ELFinder component's default connector (connector.minimal.php), which allows remote attackers to upload and execute malicious PHP scripts in the context of the web server. The vulnerable component does not enforce file type validation, allowing attackers to craft a POST request to upload executable PHP payloads through the ELFinder interface exposed at /vendor_extra/elfinder/. |
|
| CVE-2025-32461 | Apr 09, 2025 |
Tiki Wiki CVE eval injection via wikiplugin_includetpl <v28.3wikiplugin_includetpl in lib/wiki-plugins/wikiplugin_includetpl.php in Tiki before 28.3 mishandles input to an eval. The fixed versions are 21.12, 24.8, 27.2, and 28.3. |
|
| CVE-2024-47920 | Dec 30, 2024 |
Tiki Wiki CMS XSS via Improper Input NeutralizationTiki Wiki CMS CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
|
| CVE-2024-51507 | Oct 28, 2024 |
Tiki CMS 27.0 Stored XSS via External Wiki Name FieldTiki through 27.0 allows users who have certain permissions to insert a "Create/Edit External Wiki" stored XSS payload in the Name. |
|
| CVE-2024-51509 | Oct 28, 2024 |
CVE-2024-51509: Tiki 27.0 Stored XSS via Admin ModulesTiki through 27.0 allows users who have certain permissions to insert a "Modules" (aka tiki-admin_modules.php) stored XSS payload in the Name. |
|
| CVE-2024-51508 | Oct 28, 2024 |
Tiki <=27.0 Stored XSS via Create/Edit External Wiki index InsertTiki through 27.0 allows users who have certain permissions to insert a "Create/Edit External Wiki" stored XSS payload in the Index. |
|
| CVE-2024-51506 | Oct 28, 2024 |
Tiki 27.0 Stored XSS via description fieldTiki through 27.0 allows users who have certain permissions to insert a "Create a Wiki Pages" stored XSS payload in the description. |
|
| CVE-2023-22850 | Jan 14, 2023 |
Tiki <24.1 lib/sheet/grid.php PHP Object InjectionTiki before 24.1, when the Spreadsheets feature is enabled, allows lib/sheet/grid.php PHP Object Injection because of an unserialize call. |
|
| CVE-2023-22851 | Jan 14, 2023 |
Tiki <24.2 PHP OI via tikiimporter_blog_wordpress.phpTiki before 24.2 allows lib/importer/tikiimporter_blog_wordpress.php PHP Object Injection by an admin because of an unserialize call. |
|