Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24893: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-platform

0
Critical
VulnerabilityCVE-2025-24893cvecve-2025-24893cwe-95
Published: Thu Feb 20 2025 (02/20/2025, 19:19:10 UTC)
Source: CVE Database V5
Vendor/Project: xwiki
Product: xwiki-platform

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any guest can perform arbitrary remote code execution through a request to `SolrSearch`. This impacts the confidentiality, integrity and availability of the whole XWiki installation. To reproduce on an instance, without being logged in, go to `<host>/xwiki/bin/get/Main/SolrSearch?media=rss&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28"Hello%20from"%20%2B%20"%20search%20text%3A"%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20`. If there is an output, and the title of the RSS feed contains `Hello from search text:42`, then the instance is vulnerable. This vulnerability has been patched in XWiki 15.10.11, 16.4.1 and 16.5.0RC1. Users are advised to upgrade. Users unable to upgrade may edit `Main.SolrSearchMacros` in `SolrSearchMacros.xml` on line 955 to match the `rawResponse` macro in `macros.vm#L2824` with a content type of `application/xml`, instead of simply outputting the content of the feed.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:55:44 UTC

Technical Analysis

CVE-2025-24893 is an Eval Injection vulnerability (CWE-95) in the XWiki Platform's SolrSearch feature, allowing unauthenticated remote code execution. XWiki is a generic wiki platform widely used for collaborative content management and application runtime services. The vulnerability arises because the SolrSearch component improperly neutralizes directives embedded in user-supplied input, which are dynamically evaluated as Groovy code. An attacker can craft a malicious request to the SolrSearch endpoint with specially encoded payloads that inject Groovy code, which the server executes. The provided example demonstrates injecting a Groovy print statement that outputs a unique string in the RSS feed title, confirming code execution. This flaw impacts all XWiki installations running affected versions (>=5.3-milestone-2 and <15.10.11, and >=16.0.0-rc-1 and <16.4.1). Exploitation requires no authentication or user interaction, making it trivially exploitable remotely. The vulnerability compromises the confidentiality, integrity, and availability of the affected system, enabling attackers to execute arbitrary commands, manipulate data, or disrupt services. The issue was addressed by sanitizing the output in SolrSearchMacros.xml to serve content as application/xml rather than raw feed content, preventing code injection. Patches are available in XWiki versions 15.10.11, 16.4.1, and 16.5.0RC1. No known exploits are reported in the wild yet, but the high CVSS score and ease of exploitation make this a critical threat.

Potential Impact

The impact of CVE-2025-24893 is severe for organizations using the XWiki Platform, as it allows unauthenticated remote attackers to execute arbitrary code on the server. This can lead to full system compromise, including unauthorized data access, data modification or deletion, service disruption, and potential lateral movement within the network. Confidential information stored or managed via XWiki can be exposed or altered, damaging organizational reputation and compliance posture. The availability of the wiki service can be disrupted, affecting business continuity. Since XWiki is used globally in enterprises, educational institutions, and government agencies, the vulnerability poses a significant risk to any organization relying on it for collaboration or application hosting. The lack of authentication and user interaction requirements increases the likelihood of automated exploitation and rapid spread. Organizations with public-facing XWiki instances are particularly vulnerable to targeted attacks or opportunistic scanning and exploitation.

Mitigation Recommendations

To mitigate CVE-2025-24893, organizations should immediately upgrade affected XWiki Platform instances to versions 15.10.11, 16.4.1, or later. If upgrading is not immediately feasible, a temporary workaround involves editing the SolrSearchMacros.xml file, specifically modifying the 'Main.SolrSearchMacros' on line 955 to output the RSS feed content with a content type of 'application/xml' instead of raw feed content. This change prevents the dynamic evaluation of injected Groovy code. Additionally, organizations should restrict access to the SolrSearch endpoint using network-level controls such as firewalls or web application firewalls (WAFs) to limit exposure. Monitoring and logging access to the SolrSearch URL can help detect exploitation attempts. Implementing runtime application self-protection (RASP) or intrusion detection systems (IDS) that can identify suspicious Groovy code execution may also reduce risk. Finally, organizations should conduct thorough security reviews of custom macros or extensions that process user input dynamically to prevent similar injection flaws.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-01-27T15:32:29.451Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6902eea9a7d593c9933c3428

Added to database: 10/30/2025, 4:50:49 AM

Last enriched: 2/26/2026, 11:55:44 PM

Last updated: 3/22/2026, 8:12:51 AM

Views: 222

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses