Blind SQL Injection Vulnerability in XWiki by XWiki SAS
CVE-2025-32969

9.3CRITICAL

Key Information:

Vendor
Xwiki
Vendor
CVE Published:
23 April 2025

Summary

A vulnerability in XWiki allows remote unauthenticated users to escape the HQL execution context, facilitating a blind SQL injection. This enables attackers to execute arbitrary SQL queries on the backend database, potentially extracting sensitive data, such as password hashes, or executing database manipulation commands like UPDATE, INSERT, or DELETE. This issue arises even if security features, like page view and editing restrictions for unregistered users, are enabled. The vulnerability has been addressed in versions 16.10.1, 16.4.6, and 15.10.16, with no known workarounds besides upgrading.

Affected Version(s)

xwiki-platform >= 1.8, < 15.10.16 < 1.8, 15.10.16

xwiki-platform >= 16.0.0-rc-1, < 16.4.6 < 16.0.0-rc-1, 16.4.6

xwiki-platform >= 16.5.0-rc-1, < 16.10.1 < 16.5.0-rc-1, 16.10.1

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.