XWiki, Blind SQL Injection, CVE-2025-32968 (Critical)

How CVE-2025-32968 Works

This vulnerability affects XWiki versions 1.6-milestone-1 through 15.10.15, 16.4.5, and 16.10.0. Attackers with SCRIPT rights can bypass HQL (Hibernate Query Language) restrictions and inject malicious SQL queries. The flaw occurs due to insufficient input validation in REST API endpoints, allowing attackers to escape the HQL context and execute arbitrary SQL commands. Depending on the database backend, attackers can extract sensitive data (e.g., password hashes) or manipulate data via UPDATE/INSERT/DELETE queries. The vulnerability is patched in versions 15.10.16, 16.4.6, and 16.10.1.

DailyCVE Form

Platform: XWiki
Version: 1.6-milestone-1 to 16.10.0
Vulnerability: Blind SQL Injection
Severity: Critical
Date: 04/23/2025

What Undercode Say:

Exploitation Analysis

  1. Exploit Vector: Abuse SCRIPT rights to inject SQL via REST API.
  2. Impact: Data theft, privilege escalation, RCE (if DB supports it).

3. Proof of Concept (PoC):

POST /rest/wikis/xwiki/spaces/Main/pages/WebHome HTTP/1.1
Host: vulnerable-xwiki.com
Content-Type: application/x-www-form-urlencoded
Authorization: Basic [bash]
query=EXEC%20xp_cmdshell('whoami')--

Protection Measures

  1. Patch: Upgrade to XWiki ≥ 15.10.16, 16.4.6, or 16.10.1.
  2. WAF Rules: Block HQL/SQL keywords in REST requests.

3. Database Hardening:

REVOKE EXECUTE ON xp_cmdshell FROM PUBLIC;

Detection Commands

1. Log Analysis:

grep -E "HQL|SQLi" /var/log/xwiki/application.log

2. Database Audit:

SELECT FROM pg_stat_activity WHERE query LIKE '%EXEC%';

Mitigation Script

Check XWiki version
import requests
response = requests.get("http://xwiki-host/xwiki/bin/view/Main/WebHome")
if "XWiki 15.10.15" in response.text:
print("Vulnerable! Patch immediately.")

References

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top