Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49594: CWE-285: Improper Authorization in xwiki-contrib oidc

0
Critical
VulnerabilityCVE-2025-49594cvecve-2025-49594cwe-285
Published: Mon Oct 06 2025 (10/06/2025, 14:48:43 UTC)
Source: CVE Database V5
Vendor/Project: xwiki-contrib
Product: oidc

Description

XWiki OIDC has various tools to manipulate OpenID Connect protocol in XWiki. Starting in version 2.17.1 and prior to version 2.18.2, anyone with VIEW access to a user profile can create a token for that user. If that XWiki instance is configured to allow token authentication, it allows authentication with any user (since users are very commonly viewable, at least to other registered users). Version 2.18.2 contains a patch. As a workaround, disable token access.

AI-Powered Analysis

AILast updated: 10/06/2025, 15:04:59 UTC

Technical Analysis

The vulnerability CVE-2025-49594 affects the xwiki-contrib oidc module, which integrates OpenID Connect protocol support into XWiki. Specifically, in versions >= 2.17.1 and < 2.18.2, the module improperly authorizes token creation: any user with VIEW access to another user's profile can generate an authentication token for that user. Since XWiki instances often allow registered users to view other profiles, this effectively enables unauthorized users to impersonate others by authenticating with the generated tokens if token authentication is enabled. This is a classic CWE-285 (Improper Authorization) issue where access control checks are insufficient or missing. The vulnerability compromises confidentiality (unauthorized access to user accounts), integrity (potential unauthorized actions under another user's identity), and availability (possible disruption through misuse). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no user interaction, no privileges required, and high impact on confidentiality, integrity, and availability. The vulnerability was reserved in June 2025 and published in October 2025. The fix is included in version 2.18.2 of the oidc module. Until patching, disabling token authentication is advised to mitigate risk. No public exploits have been reported, but the vulnerability's nature makes it a high-risk target for attackers seeking lateral movement or privilege escalation within XWiki environments.

Potential Impact

For European organizations using XWiki with the oidc module in the vulnerable versions, this vulnerability poses a significant risk. Unauthorized users can impersonate any user with a viewable profile, potentially gaining access to sensitive internal documentation, confidential project information, or administrative functions depending on the impersonated user's privileges. This can lead to data breaches, unauthorized data manipulation, and disruption of business processes. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, government) face heightened compliance risks and potential legal penalties if exploited. The ability to authenticate as another user without credentials undermines trust in identity and access management, increasing the risk of insider threat exploitation and advanced persistent threats. Additionally, the vulnerability could facilitate lateral movement within networks, enabling attackers to escalate privileges and compromise broader IT infrastructure.

Mitigation Recommendations

European organizations should immediately identify XWiki instances running the oidc module versions between 2.17.1 and 2.18.2. The primary mitigation is to upgrade the oidc module to version 2.18.2 or later, which contains the patch. Until patching is possible, disable token authentication in the XWiki configuration to prevent token-based login exploitation. Review and restrict VIEW access permissions on user profiles to the minimum necessary, limiting exposure. Implement monitoring and alerting for unusual authentication token creation or login patterns indicative of exploitation attempts. Conduct thorough audits of user accounts and access logs to detect potential unauthorized access. Incorporate this vulnerability into incident response plans and ensure security teams are aware of the risk. Finally, consider network segmentation and additional access controls around XWiki instances to reduce attack surface and limit potential lateral movement.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-06T15:44:21.557Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e3d7f5cb24753c988f01cb

Added to database: 10/6/2025, 2:53:41 PM

Last enriched: 10/6/2025, 3:04:59 PM

Last updated: 10/7/2025, 1:13:50 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats