CVE-2025-24893: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-platform
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any guest can perform arbitrary remote code execution through a request to `SolrSearch`. This impacts the confidentiality, integrity and availability of the whole XWiki installation. To reproduce on an instance, without being logged in, go to `<host>/xwiki/bin/get/Main/SolrSearch?media=rss&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28"Hello%20from"%20%2B%20"%20search%20text%3A"%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20`. If there is an output, and the title of the RSS feed contains `Hello from search text:42`, then the instance is vulnerable. This vulnerability has been patched in XWiki 15.10.11, 16.4.1 and 16.5.0RC1. Users are advised to upgrade. Users unable to upgrade may edit `Main.SolrSearchMacros` in `SolrSearchMacros.xml` on line 955 to match the `rawResponse` macro in `macros.vm#L2824` with a content type of `application/xml`, instead of simply outputting the content of the feed.
AI Analysis
Technical Summary
CVE-2025-24893 is an Eval Injection vulnerability (CWE-95) in the XWiki Platform's SolrSearch feature, allowing unauthenticated remote code execution. XWiki is a generic wiki platform widely used for collaborative content management and application runtime services. The vulnerability arises because the SolrSearch component improperly neutralizes directives embedded in user-supplied input, which are dynamically evaluated as Groovy code. An attacker can craft a malicious request to the SolrSearch endpoint with specially encoded payloads that inject Groovy code, which the server executes. The provided example demonstrates injecting a Groovy print statement that outputs a unique string in the RSS feed title, confirming code execution. This flaw impacts all XWiki installations running affected versions (>=5.3-milestone-2 and <15.10.11, and >=16.0.0-rc-1 and <16.4.1). Exploitation requires no authentication or user interaction, making it trivially exploitable remotely. The vulnerability compromises the confidentiality, integrity, and availability of the affected system, enabling attackers to execute arbitrary commands, manipulate data, or disrupt services. The issue was addressed by sanitizing the output in SolrSearchMacros.xml to serve content as application/xml rather than raw feed content, preventing code injection. Patches are available in XWiki versions 15.10.11, 16.4.1, and 16.5.0RC1. No known exploits are reported in the wild yet, but the high CVSS score and ease of exploitation make this a critical threat.
Potential Impact
The impact of CVE-2025-24893 is severe for organizations using the XWiki Platform, as it allows unauthenticated remote attackers to execute arbitrary code on the server. This can lead to full system compromise, including unauthorized data access, data modification or deletion, service disruption, and potential lateral movement within the network. Confidential information stored or managed via XWiki can be exposed or altered, damaging organizational reputation and compliance posture. The availability of the wiki service can be disrupted, affecting business continuity. Since XWiki is used globally in enterprises, educational institutions, and government agencies, the vulnerability poses a significant risk to any organization relying on it for collaboration or application hosting. The lack of authentication and user interaction requirements increases the likelihood of automated exploitation and rapid spread. Organizations with public-facing XWiki instances are particularly vulnerable to targeted attacks or opportunistic scanning and exploitation.
Mitigation Recommendations
To mitigate CVE-2025-24893, organizations should immediately upgrade affected XWiki Platform instances to versions 15.10.11, 16.4.1, or later. If upgrading is not immediately feasible, a temporary workaround involves editing the SolrSearchMacros.xml file, specifically modifying the 'Main.SolrSearchMacros' on line 955 to output the RSS feed content with a content type of 'application/xml' instead of raw feed content. This change prevents the dynamic evaluation of injected Groovy code. Additionally, organizations should restrict access to the SolrSearch endpoint using network-level controls such as firewalls or web application firewalls (WAFs) to limit exposure. Monitoring and logging access to the SolrSearch URL can help detect exploitation attempts. Implementing runtime application self-protection (RASP) or intrusion detection systems (IDS) that can identify suspicious Groovy code execution may also reduce risk. Finally, organizations should conduct thorough security reviews of custom macros or extensions that process user input dynamically to prevent similar injection flaws.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, Japan, South Korea, India, Brazil, Italy
CVE-2025-24893: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-platform
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any guest can perform arbitrary remote code execution through a request to `SolrSearch`. This impacts the confidentiality, integrity and availability of the whole XWiki installation. To reproduce on an instance, without being logged in, go to `<host>/xwiki/bin/get/Main/SolrSearch?media=rss&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28"Hello%20from"%20%2B%20"%20search%20text%3A"%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20`. If there is an output, and the title of the RSS feed contains `Hello from search text:42`, then the instance is vulnerable. This vulnerability has been patched in XWiki 15.10.11, 16.4.1 and 16.5.0RC1. Users are advised to upgrade. Users unable to upgrade may edit `Main.SolrSearchMacros` in `SolrSearchMacros.xml` on line 955 to match the `rawResponse` macro in `macros.vm#L2824` with a content type of `application/xml`, instead of simply outputting the content of the feed.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-24893 is an Eval Injection vulnerability (CWE-95) in the XWiki Platform's SolrSearch feature, allowing unauthenticated remote code execution. XWiki is a generic wiki platform widely used for collaborative content management and application runtime services. The vulnerability arises because the SolrSearch component improperly neutralizes directives embedded in user-supplied input, which are dynamically evaluated as Groovy code. An attacker can craft a malicious request to the SolrSearch endpoint with specially encoded payloads that inject Groovy code, which the server executes. The provided example demonstrates injecting a Groovy print statement that outputs a unique string in the RSS feed title, confirming code execution. This flaw impacts all XWiki installations running affected versions (>=5.3-milestone-2 and <15.10.11, and >=16.0.0-rc-1 and <16.4.1). Exploitation requires no authentication or user interaction, making it trivially exploitable remotely. The vulnerability compromises the confidentiality, integrity, and availability of the affected system, enabling attackers to execute arbitrary commands, manipulate data, or disrupt services. The issue was addressed by sanitizing the output in SolrSearchMacros.xml to serve content as application/xml rather than raw feed content, preventing code injection. Patches are available in XWiki versions 15.10.11, 16.4.1, and 16.5.0RC1. No known exploits are reported in the wild yet, but the high CVSS score and ease of exploitation make this a critical threat.
Potential Impact
The impact of CVE-2025-24893 is severe for organizations using the XWiki Platform, as it allows unauthenticated remote attackers to execute arbitrary code on the server. This can lead to full system compromise, including unauthorized data access, data modification or deletion, service disruption, and potential lateral movement within the network. Confidential information stored or managed via XWiki can be exposed or altered, damaging organizational reputation and compliance posture. The availability of the wiki service can be disrupted, affecting business continuity. Since XWiki is used globally in enterprises, educational institutions, and government agencies, the vulnerability poses a significant risk to any organization relying on it for collaboration or application hosting. The lack of authentication and user interaction requirements increases the likelihood of automated exploitation and rapid spread. Organizations with public-facing XWiki instances are particularly vulnerable to targeted attacks or opportunistic scanning and exploitation.
Mitigation Recommendations
To mitigate CVE-2025-24893, organizations should immediately upgrade affected XWiki Platform instances to versions 15.10.11, 16.4.1, or later. If upgrading is not immediately feasible, a temporary workaround involves editing the SolrSearchMacros.xml file, specifically modifying the 'Main.SolrSearchMacros' on line 955 to output the RSS feed content with a content type of 'application/xml' instead of raw feed content. This change prevents the dynamic evaluation of injected Groovy code. Additionally, organizations should restrict access to the SolrSearch endpoint using network-level controls such as firewalls or web application firewalls (WAFs) to limit exposure. Monitoring and logging access to the SolrSearch URL can help detect exploitation attempts. Implementing runtime application self-protection (RASP) or intrusion detection systems (IDS) that can identify suspicious Groovy code execution may also reduce risk. Finally, organizations should conduct thorough security reviews of custom macros or extensions that process user input dynamically to prevent similar injection flaws.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-01-27T15:32:29.451Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6902eea9a7d593c9933c3428
Added to database: 10/30/2025, 4:50:49 AM
Last enriched: 2/26/2026, 11:55:44 PM
Last updated: 3/22/2026, 8:12:51 AM
Views: 222
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.