CVE-2025-34104

Scores

EPSS

0.566medium56.6%
0%20%40%60%80%100%

Percentile: 56.6%

CVSS

9.4critical4.0
0246810

CVSS Score: 9.4/10

All CVSS Scores

CVSS 4.0
9.4

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Description

An authenticated remote code execution vulnerability exists in Piwik (now Matomo) versions prior to 3.0.3 via the plugin upload mechanism. In vulnerable versions, an authenticated user with Superuser privileges can upload and activate a malicious plugin (ZIP archive), leading to arbitrary PHP code execution on the underlying system. Starting with version 3.0.3, plugin upload functionality is disabled by default unless explicitly enabled in the configuration file.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debianubuntu

CWEs

CWE-306

Vulnerable Software (2)

Type: Configuration

Product: matomo

Operating System: debian

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: matomo

Operating System: ubuntu plucky 25.04

Trait:
{  "unaffected": true}

Source: ubuntu

End of list