CVE-2025-70364
Published: 09 April 2026
Summary
CVE-2025-70364 is a high-severity Code Injection (CWE-94) vulnerability in Kiamo (inferred from references). Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Command and Scripting Interpreter (T1059); ranked at the 16.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely flaw remediation through patching to Kiamo 8.4 or later, which adds PHP function restrictions to directly eliminate the code injection vulnerability.
Enforces least functionality by disabling or restricting unnecessary arbitrary PHP code execution capabilities intended for administrators.
Mandates validation of information inputs to the administrative interface to prevent code injection (CWE-94) exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authenticated code injection (CWE-94) directly enables arbitrary PHP/script execution on the server, mapping to Command and Scripting Interpreter.
NVD Description
An issue was discovered in Kiamo before 8.4 allowing authenticated administrative attackers to execute arbitrary PHP code on the server. NOTE: the Supplier's position is that this is "a historical and intended administrative feature of the product, accessible only to…
more
already authenticated users explicitly granted administrator privileges." However, restrictions on some PHP functions were added in 8.4.
Deeper analysisAI
CVE-2025-70364 is a code injection vulnerability (CWE-94) in Kiamo versions prior to 8.4. The flaw enables authenticated administrative attackers to execute arbitrary PHP code on the server, earning a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Attackers require existing administrative privileges and authentication to exploit the vulnerability remotely over the network with low complexity and no user interaction. Exploitation allows full control over the server through arbitrary PHP code execution, potentially leading to complete compromise including data theft, modification, or disruption.
The supplier maintains that this is a historical and intended administrative feature accessible only to explicitly privileged users, but Kiamo 8.4 adds restrictions on certain PHP functions to mitigate it. Security practitioners should upgrade to version 8.4 or later. Relevant advisories are available at http://kiamo.com and https://github.com/hackvens/blog.hackvens.fr/blob/main/_posts/advisories/2025-12-23-CVE-2025-70364-Kiamo.md.
Details
- CWE(s)