CVE-2024-46879
Received Received - Intake
Reflected XSS in Tiki 21.2 Admin Allows Arbitrary Script Execution

Publication date: 2026-03-23

Last updated on: 2026-04-02

Assigner: MITRE

Description
A Reflected Cross-Site Scripting (XSS) vulnerability exists in the POST request data zipPath of tiki-admin_system.php in Tiki version 21.2. This vulnerability allows attackers to execute arbitrary JavaScript code via a crafted payload, leading to potential access to sensitive information or unauthorized actions.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-23
Last Modified
2026-04-02
Generated
2026-05-07
AI Q&A
2026-03-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tiki tiki to 21.11 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2024-46879 is a Reflected Cross-Site Scripting (XSS) vulnerability found in Tiki CMS version 21.2, specifically in the tiki-admin_system.php component.'}, {'type': 'paragraph', 'content': 'The vulnerability occurs because the zipPath parameter in POST requests is not properly sanitized. This means that user-supplied input in zipPath is reflected in the HTTP response without adequate encoding.'}, {'type': 'paragraph', 'content': 'An attacker can exploit this by sending a crafted POST request containing malicious JavaScript code in the zipPath parameter, which then executes in the browser of another user.'}, {'type': 'paragraph', 'content': "This can lead to unauthorized actions or access to sensitive information by executing arbitrary JavaScript in the victim's browser."}] [1]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to execute arbitrary JavaScript code in your browser when interacting with the vulnerable Tiki CMS instance.

  • Attackers may hijack user sessions, gaining unauthorized access to user accounts.
  • They can perform unauthorized actions on behalf of the user.
  • Sensitive information accessible through the browser could be exposed.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for crafted POST requests to the tiki-admin_system.php endpoint containing the zipPath parameter with suspicious or malicious JavaScript payloads.'}, {'type': 'paragraph', 'content': 'A practical approach is to capture and inspect HTTP POST traffic targeting tiki-admin_system.php and look for the presence of script tags or event handlers in the zipPath parameter.'}, {'type': 'paragraph', 'content': 'For example, using command-line tools like curl or wget to send test payloads or using network monitoring tools such as tcpdump or Wireshark to capture traffic can help detect exploitation attempts.'}, {'type': 'list_item', 'content': 'Use curl to send a crafted POST request to test for the vulnerability: curl -X POST -d "zipPath=<svg onmouseover=alert(1)>" http://your-tiki-site/tiki-admin_system.php'}, {'type': 'list_item', 'content': "Use tcpdump to capture HTTP POST requests to tiki-admin_system.php: tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep 'POST /tiki-admin_system.php'"}, {'type': 'list_item', 'content': 'Use grep or similar tools on web server logs to search for suspicious zipPath parameter values containing JavaScript code.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate and recommended mitigation is to upgrade Tiki CMS to version 21.11 or later, where this vulnerability has been fixed.

Until the upgrade can be performed, restrict access to the tiki-admin_system.php endpoint to trusted users only and monitor for suspicious POST requests targeting the zipPath parameter.

Additionally, consider applying web application firewall (WAF) rules to block requests containing suspicious JavaScript payloads in the zipPath parameter.

Plan to upgrade beyond 21.11 to supported versions such as Tiki 24.7 or Tiki 27.1 to maintain long-term security, as Tiki 21.x will reach end of life in March 2025.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart