Tikiwiki Cmsgroupware Tikiwiki Cmsgroupware

Do you want an email whenever new security vulnerabilities are reported in Tikiwiki Cmsgroupware?

By the Year

In 2024 there have been 0 vulnerabilities in Tikiwiki Cmsgroupware . Tikiwiki Cmsgroupware did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 2 5.40
2020 2 7.45
2019 2 7.10
2018 5 5.40

It may take a day or so for new Tikiwiki Cmsgroupware vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Tikiwiki Cmsgroupware Security Vulnerabilities

TikiWiki v21.4 was discovered to contain a cross-site scripting (XSS) vulnerability in the component tiki-browse_categories.php

CVE-2021-36550 5.4 - Medium - October 28, 2021

TikiWiki v21.4 was discovered to contain a cross-site scripting (XSS) vulnerability in the component tiki-browse_categories.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload under the Create category module.

XSS

TikiWiki v21.4 was discovered to contain a cross-site scripting (XSS) vulnerability in the component tiki-calendar.php

CVE-2021-36551 5.4 - Medium - October 28, 2021

TikiWiki v21.4 was discovered to contain a cross-site scripting (XSS) vulnerability in the component tiki-calendar.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload under the Add Event module.

XSS

TikiWiki 21.2 allows templates to be edited without CSRF protection

CVE-2020-29254 8.8 - High - December 11, 2020

TikiWiki 21.2 allows templates to be edited without CSRF protection. This could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to follow a maliciously crafted link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system with the privileges of the user. These action include allowing attackers to submit their own code through an authenticated user resulting in local file Inclusion. If an authenticated user who is able to edit TikiWiki templates visits an malicious website, template code can be edited.

Session Riding

There is an Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in php webpages of Tiki-Wiki Groupware

CVE-2020-8966 6.1 - Medium - April 01, 2020

There is an Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in php webpages of Tiki-Wiki Groupware. Tiki-Wiki CMS all versions through 20.0 allows malicious users to cause the injection of malicious code fragments (scripts) into a legitimate web page.

XSS

tiki/tiki-upload_file.php in Tiki 18.4 allows remote attackers to upload JavaScript code

CVE-2019-15314 5.4 - Medium - August 22, 2019

tiki/tiki-upload_file.php in Tiki 18.4 allows remote attackers to upload JavaScript code that is executed upon visiting a tiki/tiki-download_file.php?display&fileId= URI.

XSS

In Tiki before 17.2, the user task component is vulnerable to a SQL Injection

CVE-2018-20719 8.8 - High - January 15, 2019

In Tiki before 17.2, the user task component is vulnerable to a SQL Injection via the tiki-user_tasks.php show_history parameter.

SQL Injection

Tiki before 18.2, 15.7 and 12.14 has XSS

CVE-2018-14849 5.4 - Medium - August 13, 2018

Tiki before 18.2, 15.7 and 12.14 has XSS via link attributes, related to lib/core/WikiParser/OutputLink.php and lib/parser/parserlib.php.

XSS

Stored XSS vulnerabilities in Tiki before 18.2, 15.7 and 12.14

CVE-2018-14850 5.4 - Medium - August 13, 2018

Stored XSS vulnerabilities in Tiki before 18.2, 15.7 and 12.14 allow an authenticated user injecting JavaScript to gain administrator privileges if an administrator opens a wiki page and moves the mouse pointer over a modified link or thumb image.

XSS

Cross Site Scripting (XSS) exists in Tiki before 12.13

CVE-2018-7290 5.4 - Medium - March 09, 2018

Cross Site Scripting (XSS) exists in Tiki before 12.13, 15.6, 17.2, and 18.1.

XSS

The Calendar component in Tiki 17.1

CVE-2018-7303 5.4 - Medium - February 21, 2018

The Calendar component in Tiki 17.1 allows HTML injection.

XSS

An XSS vulnerability (via an SVG image) in Tiki before 18

CVE-2018-7188 5.4 - Medium - February 16, 2018

An XSS vulnerability (via an SVG image) in Tiki before 18 allows an authenticated user to gain administrator privileges if an administrator opens a wiki page with a malicious SVG image, related to lib/filegals/filegallib.php.

XSS

TikiWiki CMS/Groupware before 6.7 LTS and before 8.4

CVE-2012-0911 9.8 - Critical - July 12, 2012

TikiWiki CMS/Groupware before 6.7 LTS and before 8.4 allows remote attackers to execute arbitrary PHP code via a crafted serialized object in the (1) cookieName to lib/banners/bannerlib.php; (2) printpages or (3) printstructures parameter to (a) tiki-print_multi_pages.php or (b) tiki-print_pages.php; or (4) sendpages, (5) sendstructures, or (6) sendarticles parameter to tiki-send_objects.php, which is not properly handled when processed by the unserialize function.

Marshaling, Unmarshaling

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others

CVE-2005-1921 - July 05, 2005

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

Code Injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Debian Linux or by Tiki? Click the Watch button to subscribe.

Tiki
Vendor

subscribe