CVE-2025-49583: CWE-270: Privilege Context Switching Error in xwiki xwiki-platform
XWiki is a generic wiki platform. When a user without script right creates a document with an `XWiki.Notifications.Code.NotificationEmailRendererClass` object, and later an admin edits and saves that document, the email templates in this object will be used for notifications. No malicious code can be executed, though, as while these templates allow Velocity code, the existing generic analyzer already warns admins before editing Velocity code. The main impact would thus be to send spam, e.g., with phishing links to other users or to hide notifications about other attacks. Note that warnings before editing documents with dangerous properties have only been introduced in XWiki 15.9, before that version, this was a known issue and the advice was simply to be careful. This has been patched in XWiki 16.10.2, 16.4.7 and 15.10.16 by adding an analysis for the respective XClass properties.
AI Analysis
Technical Summary
CVE-2025-49583 is a medium-severity vulnerability affecting the XWiki platform, a widely used generic wiki software. The issue stems from a privilege context switching error (CWE-270) related to the handling of notification email templates. Specifically, when a user without script rights creates a document containing an object of the class `XWiki.Notifications.Code.NotificationEmailRendererClass`, the email templates embedded in this object are later used for notifications when an administrator edits and saves that document. Although these templates support Velocity scripting code, the platform's existing generic analyzer warns administrators before they edit any Velocity code, preventing direct execution of malicious scripts. The primary risk is that attackers could abuse this mechanism to send spam emails, potentially containing phishing links, or to conceal notifications about other attacks by manipulating notification content. This could facilitate social engineering attacks or reduce the visibility of ongoing compromises. The vulnerability affects XWiki versions prior to 15.10.16, versions between 16.0.0-rc-1 and 16.4.7, and versions between 16.5.0-rc-1 and 16.10.2. The issue was addressed in versions 15.10.16, 16.4.7, and 16.10.2 by implementing enhanced analysis of the relevant XClass properties to detect and block dangerous templates. Notably, warning prompts before editing documents with dangerous properties were introduced only in version 15.9; earlier versions lacked such safeguards, increasing risk. The CVSS 4.0 base score is 5.1 (medium), reflecting network exploitability without authentication but requiring some privilege (limited user rights) and user interaction (admin editing). No known exploits are reported in the wild as of publication. Overall, the vulnerability allows limited privilege escalation in the context of notification emails, primarily enabling spam or phishing campaigns rather than direct code execution or system compromise.
Potential Impact
For European organizations using affected versions of XWiki, the vulnerability could lead to increased phishing and spam campaigns originating from legitimate internal systems, potentially undermining trust in internal communications and increasing the risk of credential theft or malware infection. Since the vulnerability does not allow direct code execution or system takeover, the impact on system integrity and availability is limited. However, the ability to manipulate notification emails could be exploited to hide indicators of other attacks or to socially engineer users into unsafe actions. Organizations with large user bases or critical collaboration platforms relying on XWiki are at greater risk of reputational damage and operational disruption due to phishing. Additionally, sectors with stringent regulatory requirements for data protection and communication integrity (e.g., finance, healthcare, government) may face compliance risks if phishing campaigns lead to data breaches. The medium severity and lack of known exploits suggest a moderate but non-negligible threat, especially if attackers combine this vulnerability with other attack vectors.
Mitigation Recommendations
1. Upgrade all XWiki instances to the patched versions: 15.10.16, 16.4.7, or 16.10.2, depending on the current version branch. 2. For environments where immediate patching is not feasible, restrict document creation permissions to trusted users only, especially limiting the ability to create objects of the class `XWiki.Notifications.Code.NotificationEmailRendererClass`. 3. Implement strict review and approval workflows for any document edits involving Velocity templates or notification-related objects, ensuring that administrators are aware of potential risks before saving changes. 4. Enhance monitoring of outgoing notification emails for unusual patterns, such as unexpected links or mass mailings, to detect potential abuse early. 5. Educate administrators and users about the risks of phishing and the importance of scrutinizing notification content, especially when editing or approving templates. 6. Consider deploying email security solutions with advanced phishing detection and URL filtering to mitigate the impact of any spam or phishing emails generated via this vulnerability. 7. Audit existing documents for the presence of `NotificationEmailRendererClass` objects created by non-privileged users and remove or sanitize them as necessary.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2025-49583: CWE-270: Privilege Context Switching Error in xwiki xwiki-platform
Description
XWiki is a generic wiki platform. When a user without script right creates a document with an `XWiki.Notifications.Code.NotificationEmailRendererClass` object, and later an admin edits and saves that document, the email templates in this object will be used for notifications. No malicious code can be executed, though, as while these templates allow Velocity code, the existing generic analyzer already warns admins before editing Velocity code. The main impact would thus be to send spam, e.g., with phishing links to other users or to hide notifications about other attacks. Note that warnings before editing documents with dangerous properties have only been introduced in XWiki 15.9, before that version, this was a known issue and the advice was simply to be careful. This has been patched in XWiki 16.10.2, 16.4.7 and 15.10.16 by adding an analysis for the respective XClass properties.
AI-Powered Analysis
Technical Analysis
CVE-2025-49583 is a medium-severity vulnerability affecting the XWiki platform, a widely used generic wiki software. The issue stems from a privilege context switching error (CWE-270) related to the handling of notification email templates. Specifically, when a user without script rights creates a document containing an object of the class `XWiki.Notifications.Code.NotificationEmailRendererClass`, the email templates embedded in this object are later used for notifications when an administrator edits and saves that document. Although these templates support Velocity scripting code, the platform's existing generic analyzer warns administrators before they edit any Velocity code, preventing direct execution of malicious scripts. The primary risk is that attackers could abuse this mechanism to send spam emails, potentially containing phishing links, or to conceal notifications about other attacks by manipulating notification content. This could facilitate social engineering attacks or reduce the visibility of ongoing compromises. The vulnerability affects XWiki versions prior to 15.10.16, versions between 16.0.0-rc-1 and 16.4.7, and versions between 16.5.0-rc-1 and 16.10.2. The issue was addressed in versions 15.10.16, 16.4.7, and 16.10.2 by implementing enhanced analysis of the relevant XClass properties to detect and block dangerous templates. Notably, warning prompts before editing documents with dangerous properties were introduced only in version 15.9; earlier versions lacked such safeguards, increasing risk. The CVSS 4.0 base score is 5.1 (medium), reflecting network exploitability without authentication but requiring some privilege (limited user rights) and user interaction (admin editing). No known exploits are reported in the wild as of publication. Overall, the vulnerability allows limited privilege escalation in the context of notification emails, primarily enabling spam or phishing campaigns rather than direct code execution or system compromise.
Potential Impact
For European organizations using affected versions of XWiki, the vulnerability could lead to increased phishing and spam campaigns originating from legitimate internal systems, potentially undermining trust in internal communications and increasing the risk of credential theft or malware infection. Since the vulnerability does not allow direct code execution or system takeover, the impact on system integrity and availability is limited. However, the ability to manipulate notification emails could be exploited to hide indicators of other attacks or to socially engineer users into unsafe actions. Organizations with large user bases or critical collaboration platforms relying on XWiki are at greater risk of reputational damage and operational disruption due to phishing. Additionally, sectors with stringent regulatory requirements for data protection and communication integrity (e.g., finance, healthcare, government) may face compliance risks if phishing campaigns lead to data breaches. The medium severity and lack of known exploits suggest a moderate but non-negligible threat, especially if attackers combine this vulnerability with other attack vectors.
Mitigation Recommendations
1. Upgrade all XWiki instances to the patched versions: 15.10.16, 16.4.7, or 16.10.2, depending on the current version branch. 2. For environments where immediate patching is not feasible, restrict document creation permissions to trusted users only, especially limiting the ability to create objects of the class `XWiki.Notifications.Code.NotificationEmailRendererClass`. 3. Implement strict review and approval workflows for any document edits involving Velocity templates or notification-related objects, ensuring that administrators are aware of potential risks before saving changes. 4. Enhance monitoring of outgoing notification emails for unusual patterns, such as unexpected links or mass mailings, to detect potential abuse early. 5. Educate administrators and users about the risks of phishing and the importance of scrutinizing notification content, especially when editing or approving templates. 6. Consider deploying email security solutions with advanced phishing detection and URL filtering to mitigate the impact of any spam or phishing emails generated via this vulnerability. 7. Audit existing documents for the presence of `NotificationEmailRendererClass` objects created by non-privileged users and remove or sanitize them as necessary.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-06T15:44:21.556Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 684c5d9ca8c921274380b6f9
Added to database: 6/13/2025, 5:19:24 PM
Last enriched: 6/13/2025, 5:34:30 PM
Last updated: 6/14/2025, 7:22:33 AM
Views: 2
Related Threats
CVE-2025-5487: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in rubengc AutomatorWP – Automator plugin for no-code automations, webhooks & custom integrations in WordPress
HighCVE-2025-3234: CWE-434 Unrestricted Upload of File with Dangerous Type in ninjateam File Manager Pro – Filester
HighCVE-2025-50150
LowCVE-2025-50149
LowCVE-2025-50148
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.