CVE-2025-32461 Overview
CVE-2025-32461 is a critical remote code execution vulnerability affecting Tiki Wiki CMS, specifically within the wikiplugin_includetpl component located in lib/wiki-plugins/wikiplugin_includetpl.php. The vulnerability stems from improper neutralization of special elements used in template engine operations, allowing attackers to inject malicious code through unsafe handling of user input passed to PHP's eval() function.
This vulnerability is classified under CWE-1336 (Improper Neutralization of Special Elements Used in a Template Engine), highlighting the fundamental issue of insufficient input sanitization before template processing. Authenticated attackers with low privileges can exploit this flaw remotely without user interaction, potentially compromising the entire web server and any connected systems.
Critical Impact
Authenticated attackers can achieve remote code execution on Tiki Wiki installations, potentially leading to complete server compromise, data exfiltration, and lateral movement within affected networks.
Affected Products
- Tiki Wiki versions before 21.12
- Tiki Wiki versions before 24.8
- Tiki Wiki versions before 27.2
- Tiki Wiki versions before 28.3
Discovery Timeline
- 2025-04-09 - CVE-2025-32461 published to NVD
- 2025-11-03 - Last updated in NVD database
Technical Details for CVE-2025-32461
Vulnerability Analysis
The vulnerability exists in the wikiplugin_includetpl plugin, which is designed to include and process Smarty templates within Tiki Wiki pages. The core issue lies in the improper handling of user-supplied input that is eventually passed to PHP's eval() function without adequate sanitization or validation.
When processing template inclusion requests, the plugin fails to properly neutralize special elements that could be interpreted as executable code. This allows an attacker to craft malicious input that escapes the intended template context and injects arbitrary PHP code for server-side execution.
The exploitation requires only low-level authentication privileges, meaning any registered user on a vulnerable Tiki Wiki installation could potentially leverage this flaw. The scope change indicator in the vulnerability assessment suggests that successful exploitation could impact resources beyond the vulnerable component itself, potentially affecting other applications or systems on the same server.
Root Cause
The root cause of CVE-2025-32461 is the direct use of user-controllable input within an eval() statement without proper sanitization or escaping. The wikiplugin_includetpl.php file processes template names and parameters that can be manipulated by authenticated users, and these values are incorporated into dynamically evaluated code without sufficient validation.
Template engines inherently execute code to render dynamic content, but when user input is not properly neutralized before being processed by the engine, attackers can inject template directives or escape sequences that result in arbitrary code execution. In this case, the failure to sanitize input destined for eval() creates a direct code injection pathway.
Attack Vector
The attack vector for this vulnerability is network-based and requires only low-level authentication. An attacker would:
- Authenticate to a vulnerable Tiki Wiki instance with a standard user account
- Access or create a wiki page that utilizes the includetpl plugin
- Craft malicious input containing PHP code injection payloads
- Submit the crafted input, which passes through the vulnerable plugin
- The unsanitized input reaches the eval() function and executes arbitrary code with the privileges of the web server process
The vulnerability is particularly dangerous because it requires no user interaction beyond the attacker's own actions, and the complexity of exploitation is low once authentication is obtained.
Detection Methods for CVE-2025-32461
Indicators of Compromise
- Unexpected processes spawned by the web server user (e.g., www-data, apache, nginx)
- Suspicious PHP error logs showing eval() related errors or template parsing failures
- Anomalous network connections originating from the web server
- New or modified files in the Tiki Wiki directory structure outside of normal update patterns
- Unusual database queries or modifications indicating privilege escalation attempts
Detection Strategies
- Monitor web server access logs for requests containing suspicious patterns in includetpl plugin parameters
- Implement Web Application Firewall (WAF) rules to detect PHP code injection attempts in template-related requests
- Review authentication logs for unusual login patterns followed by plugin-related activity
- Deploy file integrity monitoring to detect unauthorized changes to PHP files or creation of web shells
- Configure intrusion detection systems to alert on outbound connections from web server processes
Monitoring Recommendations
- Enable verbose logging for Tiki Wiki plugin activity and review regularly
- Set up alerting for any eval() related errors in PHP error logs
- Monitor server resource utilization for anomalies that could indicate cryptomining or other malicious activity post-exploitation
- Implement egress filtering and monitor for data exfiltration patterns from web server hosts
How to Mitigate CVE-2025-32461
Immediate Actions Required
- Update Tiki Wiki immediately to one of the patched versions: 21.12, 24.8, 27.2, or 28.3
- If immediate patching is not possible, disable the includetpl plugin until updates can be applied
- Review access logs and authentication records for any suspicious activity targeting the vulnerable plugin
- Audit user accounts and remove or disable any unnecessary accounts with plugin access
- Consider temporarily restricting wiki editing capabilities to trusted administrators only
Patch Information
Tiki Wiki has released security patches addressing this vulnerability across multiple supported branches. The fixed versions are 21.12, 24.8, 27.2, and 28.3. Organizations should update to the appropriate patched version based on their current deployment.
Multiple commits have been released to address this vulnerability:
For additional information, refer to the Tiki Wiki Article Overview and Tiki Wiki Article Guide.
Workarounds
- Disable the wikiplugin_includetpl plugin by removing or renaming the file lib/wiki-plugins/wikiplugin_includetpl.php
- Implement network-level access controls to limit access to the Tiki Wiki administrative interface
- Deploy a Web Application Firewall with rules configured to block template injection patterns
- Restrict user registration and limit plugin usage to trusted authenticated users only
# Disable the vulnerable plugin temporarily
cd /path/to/tiki/lib/wiki-plugins/
mv wikiplugin_includetpl.php wikiplugin_includetpl.php.disabled
# Set restrictive permissions on plugin directory
chmod 750 /path/to/tiki/lib/wiki-plugins/
# Review logs for exploitation attempts
grep -i "includetpl" /var/log/apache2/access.log
grep -i "eval" /var/log/php/error.log
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


