CVE-2025-32429: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in xwiki xwiki-platform
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 9.4-rc-1 through 16.10.5 and 17.0.0-rc-1 through 17.2.2, it's possible for anyone to inject SQL using the parameter sort of the getdeleteddocuments.vm. It's injected as is as an ORDER BY value. This is fixed in versions 16.10.6 and 17.3.0-rc-1.
AI Analysis
Technical Summary
CVE-2025-32429 is a critical SQL Injection vulnerability (CWE-89) affecting the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability exists in versions 9.4-rc-1 through 16.10.5 and 17.0.0-rc-1 through 17.2.2. Specifically, the issue arises from improper neutralization of special elements in the 'sort' parameter of the getdeleteddocuments.vm endpoint. This parameter is directly injected into an SQL ORDER BY clause without proper sanitization or validation, allowing an unauthenticated attacker to craft malicious input that can alter the SQL query logic. Because the injection point is in the ORDER BY clause, the attacker can manipulate the sorting behavior or potentially extract or modify data by leveraging SQL syntax. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score is 9.3 (critical), reflecting the high impact on confidentiality, integrity, and availability, as well as the ease of exploitation. The vulnerability was fixed in versions 16.10.6 and 17.3.0-rc-1. No known exploits are currently reported in the wild, but the severity and ease of exploitation make it a significant risk for affected deployments. Organizations using vulnerable versions of XWiki Platform should prioritize patching to mitigate this threat.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially those relying on XWiki Platform for internal knowledge management, documentation, or collaborative applications. Exploitation could lead to unauthorized data access, data manipulation, or disruption of wiki services, potentially exposing sensitive corporate information or intellectual property. Given that the vulnerability requires no authentication, attackers can remotely exploit it without prior access, increasing the risk of widespread attacks. The impact extends to confidentiality breaches, integrity violations through unauthorized data changes, and availability issues if the database or application becomes unstable due to malicious queries. Organizations in sectors such as finance, government, healthcare, and critical infrastructure, which often use wiki platforms for documentation and collaboration, could face regulatory and reputational damage if exploited. Additionally, the vulnerability could be leveraged as a foothold for further network compromise or lateral movement within enterprise environments.
Mitigation Recommendations
1. Immediate upgrade to XWiki Platform versions 16.10.6 or later (including 17.3.0-rc-1 and beyond) to apply the official patch that addresses this SQL Injection vulnerability. 2. If immediate patching is not feasible, implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting the 'sort' parameter, especially those containing SQL keywords or special characters used in ORDER BY clauses. 3. Conduct a thorough audit of all XWiki instances to identify vulnerable versions and isolate or restrict access to affected systems until patched. 4. Review and harden database permissions to limit the impact of potential SQL injection, ensuring the database user used by XWiki has the minimum necessary privileges. 5. Monitor application logs and network traffic for unusual queries or access patterns indicative of exploitation attempts. 6. Educate development and operations teams about secure coding practices, emphasizing input validation and parameterized queries to prevent similar vulnerabilities in custom extensions or integrations. 7. Consider deploying runtime application self-protection (RASP) solutions that can detect and block SQL injection attempts in real time.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Austria
CVE-2025-32429: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in xwiki xwiki-platform
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 9.4-rc-1 through 16.10.5 and 17.0.0-rc-1 through 17.2.2, it's possible for anyone to inject SQL using the parameter sort of the getdeleteddocuments.vm. It's injected as is as an ORDER BY value. This is fixed in versions 16.10.6 and 17.3.0-rc-1.
AI-Powered Analysis
Technical Analysis
CVE-2025-32429 is a critical SQL Injection vulnerability (CWE-89) affecting the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability exists in versions 9.4-rc-1 through 16.10.5 and 17.0.0-rc-1 through 17.2.2. Specifically, the issue arises from improper neutralization of special elements in the 'sort' parameter of the getdeleteddocuments.vm endpoint. This parameter is directly injected into an SQL ORDER BY clause without proper sanitization or validation, allowing an unauthenticated attacker to craft malicious input that can alter the SQL query logic. Because the injection point is in the ORDER BY clause, the attacker can manipulate the sorting behavior or potentially extract or modify data by leveraging SQL syntax. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score is 9.3 (critical), reflecting the high impact on confidentiality, integrity, and availability, as well as the ease of exploitation. The vulnerability was fixed in versions 16.10.6 and 17.3.0-rc-1. No known exploits are currently reported in the wild, but the severity and ease of exploitation make it a significant risk for affected deployments. Organizations using vulnerable versions of XWiki Platform should prioritize patching to mitigate this threat.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially those relying on XWiki Platform for internal knowledge management, documentation, or collaborative applications. Exploitation could lead to unauthorized data access, data manipulation, or disruption of wiki services, potentially exposing sensitive corporate information or intellectual property. Given that the vulnerability requires no authentication, attackers can remotely exploit it without prior access, increasing the risk of widespread attacks. The impact extends to confidentiality breaches, integrity violations through unauthorized data changes, and availability issues if the database or application becomes unstable due to malicious queries. Organizations in sectors such as finance, government, healthcare, and critical infrastructure, which often use wiki platforms for documentation and collaboration, could face regulatory and reputational damage if exploited. Additionally, the vulnerability could be leveraged as a foothold for further network compromise or lateral movement within enterprise environments.
Mitigation Recommendations
1. Immediate upgrade to XWiki Platform versions 16.10.6 or later (including 17.3.0-rc-1 and beyond) to apply the official patch that addresses this SQL Injection vulnerability. 2. If immediate patching is not feasible, implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting the 'sort' parameter, especially those containing SQL keywords or special characters used in ORDER BY clauses. 3. Conduct a thorough audit of all XWiki instances to identify vulnerable versions and isolate or restrict access to affected systems until patched. 4. Review and harden database permissions to limit the impact of potential SQL injection, ensuring the database user used by XWiki has the minimum necessary privileges. 5. Monitor application logs and network traffic for unusual queries or access patterns indicative of exploitation attempts. 6. Educate development and operations teams about secure coding practices, emphasizing input validation and parameterized queries to prevent similar vulnerabilities in custom extensions or integrations. 7. Consider deploying runtime application self-protection (RASP) solutions that can detect and block SQL injection attempts in real time.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-08T10:54:58.367Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6882b80ead5a09ad00464500
Added to database: 7/24/2025, 10:47:42 PM
Last enriched: 8/1/2025, 1:02:39 AM
Last updated: 10/29/2025, 12:54:41 PM
Views: 95
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11632: CWE-862 Missing Authorization in jgrietveld Call Now Button – The #1 Click to Call Button for WordPress
MediumCVE-2025-11587: CWE-862 Missing Authorization in jgrietveld Call Now Button – The #1 Click to Call Button for WordPress
MediumCVE-2024-54677: CWE-400 Uncontrolled Resource Consumption in Apache Software Foundation Apache Tomcat
MediumCVE-2024-52316: CWE-391 Unchecked Error Condition in Apache Software Foundation Apache Tomcat
CriticalCVE-2024-50379: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Apache Software Foundation Apache Tomcat
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.