CVE-2024-46879
Reflected XSS in Tiki 21.2 Admin Allows Arbitrary Script Execution
Publication date: 2026-03-23
Last updated on: 2026-04-02
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tiki | tiki | to 21.11 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2024-46879 is a Reflected Cross-Site Scripting (XSS) vulnerability found in Tiki CMS version 21.2, specifically in the tiki-admin_system.php component.'}, {'type': 'paragraph', 'content': 'The vulnerability occurs because the zipPath parameter in POST requests is not properly sanitized. This means that user-supplied input in zipPath is reflected in the HTTP response without adequate encoding.'}, {'type': 'paragraph', 'content': 'An attacker can exploit this by sending a crafted POST request containing malicious JavaScript code in the zipPath parameter, which then executes in the browser of another user.'}, {'type': 'paragraph', 'content': "This can lead to unauthorized actions or access to sensitive information by executing arbitrary JavaScript in the victim's browser."}] [1]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to execute arbitrary JavaScript code in your browser when interacting with the vulnerable Tiki CMS instance.
- Attackers may hijack user sessions, gaining unauthorized access to user accounts.
- They can perform unauthorized actions on behalf of the user.
- Sensitive information accessible through the browser could be exposed.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for crafted POST requests to the tiki-admin_system.php endpoint containing the zipPath parameter with suspicious or malicious JavaScript payloads.'}, {'type': 'paragraph', 'content': 'A practical approach is to capture and inspect HTTP POST traffic targeting tiki-admin_system.php and look for the presence of script tags or event handlers in the zipPath parameter.'}, {'type': 'paragraph', 'content': 'For example, using command-line tools like curl or wget to send test payloads or using network monitoring tools such as tcpdump or Wireshark to capture traffic can help detect exploitation attempts.'}, {'type': 'list_item', 'content': 'Use curl to send a crafted POST request to test for the vulnerability: curl -X POST -d "zipPath=<svg onmouseover=alert(1)>" http://your-tiki-site/tiki-admin_system.php'}, {'type': 'list_item', 'content': "Use tcpdump to capture HTTP POST requests to tiki-admin_system.php: tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep 'POST /tiki-admin_system.php'"}, {'type': 'list_item', 'content': 'Use grep or similar tools on web server logs to search for suspicious zipPath parameter values containing JavaScript code.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate and recommended mitigation is to upgrade Tiki CMS to version 21.11 or later, where this vulnerability has been fixed.
Until the upgrade can be performed, restrict access to the tiki-admin_system.php endpoint to trusted users only and monitor for suspicious POST requests targeting the zipPath parameter.
Additionally, consider applying web application firewall (WAF) rules to block requests containing suspicious JavaScript payloads in the zipPath parameter.
Plan to upgrade beyond 21.11 to supported versions such as Tiki 24.7 or Tiki 27.1 to maintain long-term security, as Tiki 21.x will reach end of life in March 2025.