Remote Code Execution Vulnerability in XWiki Platform by XWiki SAS
CVE-2025-24893
Key Information:
- Vendor
- Xwiki
- Status
- Vendor
- CVE Published:
- 20 February 2025
Badges
Summary
The XWiki Platform is vulnerable due to improper handling of inputs, allowing unauthenticated users to execute arbitrary code via the SolrSearch
endpoint. This can result in significant breaches of confidentiality, integrity, and availability of the XWiki installation. Users are encouraged to upgrade to versions 15.10.11, 16.4.1, or 16.5.0RC1 to mitigate risks. For those unable to upgrade immediately, a temporary fix involves modifying the SolrSearchMacros.xml
file to ensure that the response type matches application/xml
, thereby reducing exposure.
Affected Version(s)
xwiki-platform >= 5.3-milestone-2, < 15.10.11 < 5.3-milestone-2, 15.10.11
xwiki-platform >= 16.0.0-rc-1, < 16.4.1 < 16.0.0-rc-1, 16.4.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
77% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved