Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24893: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-platform

0
Critical
VulnerabilityCVE-2025-24893cvecve-2025-24893cwe-95
Published: Thu Feb 20 2025 (02/20/2025, 19:19:10 UTC)
Source: CVE Database V5
Vendor/Project: xwiki
Product: xwiki-platform

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any guest can perform arbitrary remote code execution through a request to `SolrSearch`. This impacts the confidentiality, integrity and availability of the whole XWiki installation. To reproduce on an instance, without being logged in, go to `<host>/xwiki/bin/get/Main/SolrSearch?media=rss&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28"Hello%20from"%20%2B%20"%20search%20text%3A"%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20`. If there is an output, and the title of the RSS feed contains `Hello from search text:42`, then the instance is vulnerable. This vulnerability has been patched in XWiki 15.10.11, 16.4.1 and 16.5.0RC1. Users are advised to upgrade. Users unable to upgrade may edit `Main.SolrSearchMacros` in `SolrSearchMacros.xml` on line 955 to match the `rawResponse` macro in `macros.vm#L2824` with a content type of `application/xml`, instead of simply outputting the content of the feed.

AI-Powered Analysis

AILast updated: 10/30/2025, 04:51:30 UTC

Technical Analysis

CVE-2025-24893 is a critical security vulnerability in the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications. The vulnerability arises from improper neutralization of directives in dynamically evaluated code, classified as CWE-95 (Eval Injection). Specifically, the SolrSearch component improperly processes user-supplied input in the 'text' parameter of a request to the SolrSearch RSS feed endpoint. An unauthenticated attacker can craft a request embedding Groovy code within the search text parameter, which the platform evaluates and executes on the server side. This leads to arbitrary remote code execution (RCE) without requiring authentication or user interaction. The vulnerability affects all XWiki versions from 5.3-milestone-2 up to but not including 15.10.11, and from 16.0.0-rc-1 up to but not including 16.4.1. The exploitation method involves sending a specially crafted HTTP GET request to the endpoint `/xwiki/bin/get/Main/SolrSearch` with parameters that inject Groovy code. If successful, the response RSS feed title contains output from the injected code, confirming execution. This flaw compromises the confidentiality, integrity, and availability of the entire XWiki installation, allowing attackers to execute arbitrary commands, potentially leading to full system compromise. The vulnerability has been patched in versions 15.10.11, 16.4.1, and 16.5.0RC1. For users unable to upgrade immediately, a temporary mitigation involves editing the `Main.SolrSearchMacros` in `SolrSearchMacros.xml` to change the macro output content type to `application/xml`, preventing raw execution of injected code. The CVSS v3.1 score of 9.8 reflects the critical nature of this vulnerability, with network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability.

Potential Impact

For European organizations, the impact of CVE-2025-24893 is significant due to the widespread use of XWiki as an enterprise wiki and collaboration platform. Successful exploitation can lead to full remote code execution by unauthenticated attackers, resulting in complete compromise of the affected systems. This can cause data breaches exposing sensitive corporate information, unauthorized modification or deletion of critical content, disruption of business operations, and potential lateral movement within the network. Given that XWiki often stores documentation, project plans, and internal knowledge, the confidentiality and integrity of vital business information are at high risk. The availability of the platform can also be disrupted, affecting collaboration and productivity. Additionally, compromised XWiki servers could be leveraged as pivot points for further attacks against European organizations’ internal infrastructure. The critical severity and ease of exploitation make this vulnerability a high-priority threat for organizations relying on vulnerable XWiki versions.

Mitigation Recommendations

1. Immediate upgrade to patched XWiki versions 15.10.11, 16.4.1, or later is the most effective mitigation. 2. For organizations unable to upgrade promptly, apply the temporary workaround by editing the `Main.SolrSearchMacros` in `SolrSearchMacros.xml` at line 955 to change the `rawResponse` macro to output content with the content type `application/xml` instead of raw feed content, preventing code execution. 3. Restrict access to the SolrSearch endpoint via network controls or web application firewalls (WAF) to limit exposure to untrusted users. 4. Monitor web server logs for suspicious requests containing Groovy code patterns or unusual parameters targeting the SolrSearch endpoint. 5. Implement strict input validation and output encoding in custom XWiki extensions or macros to prevent similar injection flaws. 6. Conduct regular security audits and vulnerability scans to detect outdated XWiki versions. 7. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block exploitation attempts. 8. Maintain robust backup and incident response plans to recover quickly in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-01-27T15:32:29.451Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6902eea9a7d593c9933c3428

Added to database: 10/30/2025, 4:50:49 AM

Last enriched: 10/30/2025, 4:51:30 AM

Last updated: 10/30/2025, 5:54:03 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats