XWiki, XClass Definitions Code Execution, CVE-2025-XXXXX (Critical)

Listen to this Post

How the CVE Works

The vulnerability arises when an attacker with edit rights but no script/programming rights creates an XClass definition in XWiki. If a privileged user (with script, admin, or programming rights) later edits the same document, malicious code embedded in custom display scripts, computed properties, or database list queries executes with the victim’s elevated permissions. Prior to XWiki 15.9, no warnings were shown for dangerous properties, making exploitation silent. The flaw bypasses security checks by leveraging improper validation of XClass properties during document edits.

DailyCVE Form

Platform: XWiki
Version: <15.10.16, 16.0.0-16.4.6, 16.5.0-16.10.1
Vulnerability: Code Execution
Severity: Critical
Date: Jun 13, 2025

Prediction: Patch expected by Jun 20, 2025

What Undercode Say

Check XWiki version
xwiki-version --status
List vulnerable XClass properties
xwiki-audit --xclass --risk high
Mitigation command (pre-patch)
xwiki-config --disable-xclass-edit --force

How Exploit

1. Attacker crafts malicious XClass.

2. Privileged user edits document.

3. Code executes as victim.

Protection from this CVE

  • Upgrade to 15.10.16/16.4.7/16.10.2.
  • Restrict edit rights.
  • Audit XClass properties.

Impact

  • Privilege escalation.
  • Remote code execution.
  • Silent exploitation.

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top