{"id":23721,"date":"2025-04-15T23:17:03","date_gmt":"2025-04-15T23:17:03","guid":{"rendered":""},"modified":"2025-04-30T06:18:24","modified_gmt":"2025-04-30T06:18:24","slug":"cve-2025-32461-critical-vulnerability-in-tiki-s-wikiplugin-includetpl","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-32461-critical-vulnerability-in-tiki-s-wikiplugin-includetpl\/","title":{"rendered":"<strong>CVE-2025-32461: Critical Vulnerability in Tiki&#8217;s wikiplugin_includetpl<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>CVE-2025-32461 is a critical vulnerability found in Tiki&#8217;s wikiplugin_includetpl, a component of the popular Tiki software. Tiki is widely used for creating and managing online content; therefore, this vulnerability has the potential to affect a large number of users. It is particularly significant due to the high severity score given, which reflects the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-0573-critical-vulnerability-in-totolink-lr1200gb-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"29031\">potential for system<\/a> compromise or data leakage, leading to serious consequences for affected parties.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-32461<br \/>\nSeverity: Critical (9.9 CVSS score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-0576-critical-vulnerability-in-totolink-lr1200gb-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"29365\">Potential system<\/a> compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-1434630484\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Tiki | Before 28.3<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-58250-privilege-mishandling-vulnerability-in-pppd-s-passprompt-plugin\/\"  data-wpil-monitor-id=\"38446\">vulnerability lies in the mishandling<\/a> of input to an eval function in the wikiplugin_includetpl in lib\/wiki-plugins\/wikiplugin_includetpl.php. This improper input handling enables attackers to inject malicious code into the software, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-0572-critical-vulnerability-in-totolink-lr1200gb-leading-to-system-compromise\/\"  data-wpil-monitor-id=\"28972\">leading to unauthorized access or control of the system<\/a>. This can result in either <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-33113-memory-corruption-vulnerability-leading-to-system-compromise-or-data-leakage\/\"  data-wpil-monitor-id=\"31372\">system compromise or data<\/a> leakage.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-1308226292\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here is a conceptual example of how the <a href=\"https:\/\/www.ameeba.com\/blog\/fortinet-s-fortigate-vulnerability-ssl-vpn-symlink-exploit-puts-user-access-at-risk-post-patching\/\"  data-wpil-monitor-id=\"30064\">vulnerability might be exploited<\/a>. In this case, a malicious HTTP request is sent to the server running the <a href=\"https:\/\/www.ameeba.com\/blog\/airborne-cybersecurity-the-threat-of-vulnerable-software-and-outdated-tech-in-the-aviation-industry\/\"  data-wpil-monitor-id=\"30843\">vulnerable Tiki software<\/a>.<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/vulnerable\/wikiplugin_includetpl.php HTTP\/1.1\nHost: target.example.com\nContent-Type: application\/x-www-form-urlencoded\neval_code={ &quot;malicious_payload&quot;: &quot;...&quot; }<\/code><\/pre>\n<p>In this request, the &#8220;malicious_payload&#8221; is the attacker\u2019s <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-21672-unpatched-confluence-data-center-and-server-prone-to-high-risk-remote-code-execution\/\"  data-wpil-monitor-id=\"28892\">code that would be executed on the server<\/a> due to the vulnerability.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>The best way to protect your <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3328-buffer-overflow-vulnerability-in-tenda-ac1206-could-lead-to-system-compromise\/\"  data-wpil-monitor-id=\"29855\">system from this vulnerability<\/a> is to apply the patch provided by the vendor. The fixed versions are 21.12, 24.8, 27.2, and 28.3. If you are unable to apply the patch immediately, you can use a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) as a temporary mitigation measure. However, these are only temporary solutions and will not provide complete protection against the vulnerability. Therefore, it is highly recommended to apply the patch as soon as possible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview CVE-2025-32461 is a critical vulnerability found in Tiki&#8217;s wikiplugin_includetpl, a component of the popular Tiki software. Tiki is widely used for creating and managing online content; therefore, this vulnerability has the potential to affect a large number of users. It is particularly significant due to the high severity score given, which reflects the potential [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-23721","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/23721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=23721"}],"version-history":[{"count":10,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/23721\/revisions"}],"predecessor-version":[{"id":33919,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/23721\/revisions\/33919"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=23721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=23721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=23721"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=23721"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=23721"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=23721"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=23721"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=23721"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=23721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}