TikiWiki is a web-based groupware and content management system (CMS), using PHP, ADOdb and Smarty. TikiWiki includes vulnerable PHP XML-RPC code.
TikiWiki is vulnerable to arbitrary command execution as described in GLSA 200507-01.
A remote attacker could exploit this vulnerability to execute arbitrary PHP code by sending specially crafted XML data.
There is no known workaround at this time.
All TikiWiki users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.5-r1"