XWiki is an open-source wiki software platform. Any XWiki user with edit right on at least one App Within Minutes application (the default for all users XWiki) can obtain programming right/perform remote code execution by editing the application. This vulnerability has been fixed in XWiki 17.0.0, 16.4.7, and 16.10.3.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-platform/commit/ef978315649cf83eae396021bb33603a1a5f7e42 | Patch |
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp4x-w9cj-97q7 | Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-22719 | Exploit Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
03 Sep 2025, 17:47
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:xwiki:xwiki:17.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* cpe:2.3:a:xwiki:xwiki:7.2:milestone3:*:*:*:*:*:* cpe:2.3:a:xwiki:xwiki:7.2:milestone2:*:*:*:*:*:* |
|
References | () https://github.com/xwiki/xwiki-platform/commit/ef978315649cf83eae396021bb33603a1a5f7e42 - Patch | |
References | () https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp4x-w9cj-97q7 - Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-22719 - Exploit, Issue Tracking, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Xwiki xwiki
Xwiki |
16 Jun 2025, 12:32
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-13 18:15
Updated : 2025-09-03 17:47
NVD link : CVE-2025-49586
Mitre link : CVE-2025-49586
CVE.ORG link : CVE-2025-49586
JSON object : View
Products Affected
xwiki
- xwiki
CWE
CWE-863
Incorrect Authorization