CVE-2025-49583: CWE-270: Privilege Context Switching Error in xwiki xwiki-platform

Medium
VulnerabilityCVE-2025-49583cvecve-2025-49583cwe-270cwe-357
Published: Fri Jun 13 2025 (06/13/2025, 17:04:49 UTC)
Source: CVE Database V5
Vendor/Project: xwiki
Product: xwiki-platform

Description

XWiki is a generic wiki platform. When a user without script right creates a document with an `XWiki.Notifications.Code.NotificationEmailRendererClass` object, and later an admin edits and saves that document, the email templates in this object will be used for notifications. No malicious code can be executed, though, as while these templates allow Velocity code, the existing generic analyzer already warns admins before editing Velocity code. The main impact would thus be to send spam, e.g., with phishing links to other users or to hide notifications about other attacks. Note that warnings before editing documents with dangerous properties have only been introduced in XWiki 15.9, before that version, this was a known issue and the advice was simply to be careful. This has been patched in XWiki 16.10.2, 16.4.7 and 15.10.16 by adding an analysis for the respective XClass properties.

AI-Powered Analysis

AILast updated: 06/13/2025, 17:34:30 UTC

Technical Analysis

CVE-2025-49583 is a medium-severity vulnerability affecting the XWiki platform, a widely used generic wiki software. The issue stems from a privilege context switching error (CWE-270) related to the handling of notification email templates. Specifically, when a user without script rights creates a document containing an object of the class `XWiki.Notifications.Code.NotificationEmailRendererClass`, the email templates embedded in this object are later used for notifications when an administrator edits and saves that document. Although these templates support Velocity scripting code, the platform's existing generic analyzer warns administrators before they edit any Velocity code, preventing direct execution of malicious scripts. The primary risk is that attackers could abuse this mechanism to send spam emails, potentially containing phishing links, or to conceal notifications about other attacks by manipulating notification content. This could facilitate social engineering attacks or reduce the visibility of ongoing compromises. The vulnerability affects XWiki versions prior to 15.10.16, versions between 16.0.0-rc-1 and 16.4.7, and versions between 16.5.0-rc-1 and 16.10.2. The issue was addressed in versions 15.10.16, 16.4.7, and 16.10.2 by implementing enhanced analysis of the relevant XClass properties to detect and block dangerous templates. Notably, warning prompts before editing documents with dangerous properties were introduced only in version 15.9; earlier versions lacked such safeguards, increasing risk. The CVSS 4.0 base score is 5.1 (medium), reflecting network exploitability without authentication but requiring some privilege (limited user rights) and user interaction (admin editing). No known exploits are reported in the wild as of publication. Overall, the vulnerability allows limited privilege escalation in the context of notification emails, primarily enabling spam or phishing campaigns rather than direct code execution or system compromise.

Potential Impact

For European organizations using affected versions of XWiki, the vulnerability could lead to increased phishing and spam campaigns originating from legitimate internal systems, potentially undermining trust in internal communications and increasing the risk of credential theft or malware infection. Since the vulnerability does not allow direct code execution or system takeover, the impact on system integrity and availability is limited. However, the ability to manipulate notification emails could be exploited to hide indicators of other attacks or to socially engineer users into unsafe actions. Organizations with large user bases or critical collaboration platforms relying on XWiki are at greater risk of reputational damage and operational disruption due to phishing. Additionally, sectors with stringent regulatory requirements for data protection and communication integrity (e.g., finance, healthcare, government) may face compliance risks if phishing campaigns lead to data breaches. The medium severity and lack of known exploits suggest a moderate but non-negligible threat, especially if attackers combine this vulnerability with other attack vectors.

Mitigation Recommendations

1. Upgrade all XWiki instances to the patched versions: 15.10.16, 16.4.7, or 16.10.2, depending on the current version branch. 2. For environments where immediate patching is not feasible, restrict document creation permissions to trusted users only, especially limiting the ability to create objects of the class `XWiki.Notifications.Code.NotificationEmailRendererClass`. 3. Implement strict review and approval workflows for any document edits involving Velocity templates or notification-related objects, ensuring that administrators are aware of potential risks before saving changes. 4. Enhance monitoring of outgoing notification emails for unusual patterns, such as unexpected links or mass mailings, to detect potential abuse early. 5. Educate administrators and users about the risks of phishing and the importance of scrutinizing notification content, especially when editing or approving templates. 6. Consider deploying email security solutions with advanced phishing detection and URL filtering to mitigate the impact of any spam or phishing emails generated via this vulnerability. 7. Audit existing documents for the presence of `NotificationEmailRendererClass` objects created by non-privileged users and remove or sanitize them as necessary.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-06T15:44:21.556Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 684c5d9ca8c921274380b6f9

Added to database: 6/13/2025, 5:19:24 PM

Last enriched: 6/13/2025, 5:34:30 PM

Last updated: 6/14/2025, 7:22:33 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats