XWiki, Incomplete Macro Rights Warning, CVE-2025-XXXXX (Critical)

Listen to this Post

How the CVE Works

XWiki versions 15.9-rc-1 to 16.4.6, 16.5.0-rc-1 to 16.10.2, and 17.0.0-rc-1 are vulnerable due to incomplete rights validation for macros. The system fails to properly analyze non-lowercase macro parameters and certain fields like “source” parameters in content/context macros. Attackers can inject malicious scripts (e.g., Groovy/Python) into pages. When a privileged user edits the page, the scripts execute, leading to remote code execution (RCE).

DailyCVE Form

Platform: XWiki
Version: 15.9-rc-1 – 16.4.6
Vulnerability: Incomplete macro rights
Severity: Critical
Date: 2025-06-13

Prediction: Patch expected by 2025-06-20

What Undercode Say

Check XWiki version
curl -s http://xwiki-host/version | grep "XWiki"
Exploit PoC (hypothetical)
POST /editpage HTTP/1.1
Content-Type: text/xwiki
...
{macro:Script}{groovy}malicious-code{/groovy}{/macro}

How Exploit

  1. Attacker injects malicious macro via crafted page edit.

2. Privileged user edits page, triggering script execution.

3. RCE achieved under privileged context.

Protection from this CVE

  • Upgrade to XWiki 16.4.7/16.10.3/17.0.0.
  • Restrict edit rights for untrusted users.

Impact

  • Remote Code Execution (RCE).
  • Privilege escalation via macro abuse.

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top