XWiki, Cross-Site Scripting (XSS), CVE-2025-XXXX (Moderate)

Listen to this Post

XWiki fails to enforce proper rights warnings for `NotificationDisplayer` objects, leading to a stored XSS vulnerability. When a low-privileged user creates a document containing a malicious `XWiki.Notifications.Code.NotificationDisplayerClass` object, an admin editing and saving it later triggers raw HTML rendering without sufficient warnings. The injected payload executes in the admin’s context, bypassing Velocity script restrictions. Although XWiki 15.9+ introduced warnings for dangerous properties, earlier versions lack this safeguard. The flaw stems from missing required-rights validation during admin edits, allowing untrusted content to persist.

DailyCVE Form:

Platform: XWiki
Version: 15.9-rc-1 to 16.10.1
Vulnerability: Stored XSS
Severity: Moderate
Date: Jun 13, 2025

Prediction: Patch by Jul 2025

What Undercode Say:

<!-- Example vulnerable object -->

<object class="XWiki.Notifications.Code.NotificationDisplayerClass">
<property name="content"><script>malicious()</script></property>
</object>

checkScriptRights() Missing in affected versions

How Exploit:

1. Low-privileged user creates document with malicious `NotificationDisplayer`.

2. Admin edits/saves document.

3. Payload renders as raw HTML.

Protection from this CVE:

  • Upgrade to XWiki 15.10.16/16.4.7/16.10.2.
  • Audit documents for NotificationDisplayerClass.
  • Restrict script/admin rights.

Impact:

  • Admin session hijacking via XSS.
  • Data theft/privilege escalation.

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top