Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24893: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-platform

0
Critical
VulnerabilityCVE-2025-24893cvecve-2025-24893cwe-95
Published: Thu Feb 20 2025 (02/20/2025, 19:19:10 UTC)
Source: CVE Database V5
Vendor/Project: xwiki
Product: xwiki-platform

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any guest can perform arbitrary remote code execution through a request to `SolrSearch`. This impacts the confidentiality, integrity and availability of the whole XWiki installation. To reproduce on an instance, without being logged in, go to `<host>/xwiki/bin/get/Main/SolrSearch?media=rss&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28"Hello%20from"%20%2B%20"%20search%20text%3A"%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20`. If there is an output, and the title of the RSS feed contains `Hello from search text:42`, then the instance is vulnerable. This vulnerability has been patched in XWiki 15.10.11, 16.4.1 and 16.5.0RC1. Users are advised to upgrade. Users unable to upgrade may edit `Main.SolrSearchMacros` in `SolrSearchMacros.xml` on line 955 to match the `rawResponse` macro in `macros.vm#L2824` with a content type of `application/xml`, instead of simply outputting the content of the feed.

AI-Powered Analysis

AILast updated: 11/06/2025, 07:28:45 UTC

Technical Analysis

CVE-2025-24893 is a critical vulnerability in the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications. The flaw is categorized under CWE-95, indicating improper neutralization of directives in dynamically evaluated code, commonly known as Eval Injection. The vulnerability exists in the SolrSearch component, which processes search queries and returns results. Specifically, the SolrSearch endpoint improperly handles user-supplied input in the 'text' parameter, allowing an attacker to inject Groovy code that is dynamically evaluated without proper sanitization or validation. This enables an unauthenticated attacker to perform arbitrary remote code execution (RCE) on the server hosting the XWiki instance. The exploitation method involves crafting a specially formatted request to the SolrSearch URL with embedded Groovy code, which the server executes, potentially allowing full control over the system. The vulnerability affects all XWiki Platform versions from 5.3-milestone-2 up to but not including 15.10.11, and from 16.0.0-rc-1 up to but not including 16.4.1. The vendor has released patches in versions 15.10.11, 16.4.1, and 16.5.0RC1 to address this issue. For users unable to upgrade immediately, a temporary mitigation involves editing the SolrSearchMacros.xml file to change the output content type to 'application/xml' instead of outputting raw feed content, thereby preventing code execution. The CVSS v3.1 base score is 9.8, reflecting the vulnerability's high impact on confidentiality, integrity, and availability, combined with its ease of exploitation without authentication or user interaction. Although no active exploits have been reported in the wild, the vulnerability poses a significant risk to any exposed XWiki installations, especially those accessible over the internet.

Potential Impact

The impact of CVE-2025-24893 on European organizations can be severe due to the critical nature of the vulnerability. XWiki is used by various enterprises, educational institutions, and government agencies across Europe for collaborative documentation and knowledge management. Successful exploitation allows attackers to execute arbitrary code remotely without authentication, leading to full system compromise. This can result in unauthorized data access, data manipulation, service disruption, and potential lateral movement within networks. Confidential information stored in XWiki instances could be exfiltrated, altered, or destroyed, impacting data confidentiality and integrity. Availability of the platform can be disrupted by attackers deploying ransomware or deleting critical data. Given the widespread use of XWiki in sectors such as public administration, research, and private enterprises, this vulnerability could facilitate espionage, sabotage, or data breaches. The ease of exploitation increases the likelihood of automated scanning and attacks, especially against publicly accessible XWiki servers. European organizations with internet-facing XWiki deployments are at heightened risk, potentially affecting compliance with GDPR and other data protection regulations if sensitive data is compromised.

Mitigation Recommendations

To mitigate CVE-2025-24893, European organizations should prioritize upgrading affected XWiki Platform instances to versions 15.10.11, 16.4.1, or later, where the vulnerability is patched. For environments where immediate upgrade is not feasible, administrators should apply the temporary workaround by editing the 'Main.SolrSearchMacros' in the 'SolrSearchMacros.xml' file at line 955. This involves modifying the 'rawResponse' macro to set the content type to 'application/xml' instead of outputting the raw feed content, which prevents the execution of injected Groovy code. Additionally, organizations should restrict access to the SolrSearch endpoint by implementing network-level controls such as IP whitelisting, VPN access, or web application firewalls (WAFs) with custom rules to detect and block suspicious payloads containing Groovy code or unusual patterns. Continuous monitoring of XWiki logs for anomalous requests to the SolrSearch endpoint is recommended to detect potential exploitation attempts. Employing runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions can help identify and mitigate exploitation in real-time. Finally, organizations should conduct regular security assessments and penetration testing focused on XWiki deployments to ensure no residual vulnerabilities remain.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-01-27T15:32:29.451Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6902eea9a7d593c9933c3428

Added to database: 10/30/2025, 4:50:49 AM

Last enriched: 11/6/2025, 7:28:45 AM

Last updated: 12/13/2025, 11:08:37 AM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats