Unrestricted file upload vulnerability in jhot.php in TikiWiki 1.9.4 Sirius and earlier allows remote attackers to execute arbitrary PHP code via a filepath parameter that contains a filename with a .php extension, which is uploaded to the img/wiki/ directory.
https://www.exploit-db.com/exploits/2288
http://www.vupen.com/english/advisories/2006/3450
http://tikiwiki.org/tiki-read_article.php?articleId=136
http://security.gentoo.org/glsa/glsa-200609-16.xml
http://secunia.com/advisories/22100