CVE-2025-51990: n/a
XWiki through version 17.3.0 is affected by multiple stored Cross-Site Scripting (XSS) vulnerabilities in the Administration interface, specifically under the Presentation section of the Global Preferences panel. An authenticated administrator can inject arbitrary JavaScript payloads into the HTTP Meta Info, Footer Copyright, and Footer Version fields. These inputs are stored and subsequently rendered without proper output encoding or sanitization on public-facing pages. As a result, the injected scripts are persistently executed in the browser context of any visitor to the affected instances including both authenticated and unauthenticated users. No user interaction is required beyond visiting a page that includes the malicious content. Successful exploitation can lead to session hijacking, credential theft, unauthorized actions via session riding, or further compromise of the application through client-side attacks. The vulnerability introduces significant risk in any deployment, especially in shared or internet-facing environments where administrator credentials may be compromised.
AI Analysis
Technical Summary
CVE-2025-51990 is a set of stored Cross-Site Scripting (XSS) vulnerabilities affecting XWiki versions up to and including 17.3.0. The vulnerabilities reside in the Administration interface, specifically within the Presentation section of the Global Preferences panel. An authenticated administrator can inject arbitrary JavaScript payloads into three fields: HTTP Meta Info, Footer Copyright, and Footer Version. These inputs are stored persistently and rendered on public-facing pages without proper output encoding or sanitization. Consequently, any visitor to the affected pages, whether authenticated or not, will have the malicious scripts executed in their browser context automatically upon page load, without requiring any additional user interaction. Exploitation of these vulnerabilities can lead to session hijacking, credential theft, unauthorized actions performed via session riding, and further compromise of the application through client-side attacks. The attack vector requires an attacker to have administrator credentials to inject the payloads, but once injected, the impact extends to all users visiting the affected pages. The lack of proper output encoding in a widely used enterprise wiki platform like XWiki poses a significant risk, especially in shared or internet-facing deployments where administrator credentials might be compromised or stolen. No known exploits are currently reported in the wild, and no official patches or CVSS scores have been published as of the vulnerability disclosure date.
Potential Impact
For European organizations, this vulnerability presents a serious risk, particularly for those using XWiki as a collaborative platform accessible over the internet or within large intranets. The ability for an attacker with administrator access to inject persistent XSS payloads means that all users accessing the affected pages could be exposed to client-side attacks, potentially leading to widespread session hijacking and credential theft. This could result in unauthorized access to sensitive corporate information, disruption of business processes, and reputational damage. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face heightened compliance risks under GDPR if personal data is compromised through such attacks. The vulnerability's exploitation could also facilitate lateral movement within networks, enabling attackers to escalate privileges or deploy further malware. The threat is amplified in environments where administrator credentials are weak, reused, or susceptible to phishing, increasing the likelihood of initial compromise.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately review and restrict administrator access to the XWiki Global Preferences panel, enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. Administrators should audit the HTTP Meta Info, Footer Copyright, and Footer Version fields for any suspicious or unauthorized content and sanitize or remove any injected scripts. Organizations should implement strict input validation and output encoding controls within their XWiki instances, either by applying vendor patches once available or by deploying web application firewalls (WAFs) with custom rules to detect and block malicious script injections and payloads. Regular monitoring of administrator activities and logs can help detect anomalous behavior indicative of exploitation attempts. Additionally, organizations should educate administrators on secure credential management and phishing awareness to prevent initial access. Where feasible, isolating XWiki instances behind VPNs or restricting access to trusted networks can further reduce exposure. Finally, organizations should stay updated with vendor advisories for official patches and apply them promptly upon release.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-51990: n/a
Description
XWiki through version 17.3.0 is affected by multiple stored Cross-Site Scripting (XSS) vulnerabilities in the Administration interface, specifically under the Presentation section of the Global Preferences panel. An authenticated administrator can inject arbitrary JavaScript payloads into the HTTP Meta Info, Footer Copyright, and Footer Version fields. These inputs are stored and subsequently rendered without proper output encoding or sanitization on public-facing pages. As a result, the injected scripts are persistently executed in the browser context of any visitor to the affected instances including both authenticated and unauthenticated users. No user interaction is required beyond visiting a page that includes the malicious content. Successful exploitation can lead to session hijacking, credential theft, unauthorized actions via session riding, or further compromise of the application through client-side attacks. The vulnerability introduces significant risk in any deployment, especially in shared or internet-facing environments where administrator credentials may be compromised.
AI-Powered Analysis
Technical Analysis
CVE-2025-51990 is a set of stored Cross-Site Scripting (XSS) vulnerabilities affecting XWiki versions up to and including 17.3.0. The vulnerabilities reside in the Administration interface, specifically within the Presentation section of the Global Preferences panel. An authenticated administrator can inject arbitrary JavaScript payloads into three fields: HTTP Meta Info, Footer Copyright, and Footer Version. These inputs are stored persistently and rendered on public-facing pages without proper output encoding or sanitization. Consequently, any visitor to the affected pages, whether authenticated or not, will have the malicious scripts executed in their browser context automatically upon page load, without requiring any additional user interaction. Exploitation of these vulnerabilities can lead to session hijacking, credential theft, unauthorized actions performed via session riding, and further compromise of the application through client-side attacks. The attack vector requires an attacker to have administrator credentials to inject the payloads, but once injected, the impact extends to all users visiting the affected pages. The lack of proper output encoding in a widely used enterprise wiki platform like XWiki poses a significant risk, especially in shared or internet-facing deployments where administrator credentials might be compromised or stolen. No known exploits are currently reported in the wild, and no official patches or CVSS scores have been published as of the vulnerability disclosure date.
Potential Impact
For European organizations, this vulnerability presents a serious risk, particularly for those using XWiki as a collaborative platform accessible over the internet or within large intranets. The ability for an attacker with administrator access to inject persistent XSS payloads means that all users accessing the affected pages could be exposed to client-side attacks, potentially leading to widespread session hijacking and credential theft. This could result in unauthorized access to sensitive corporate information, disruption of business processes, and reputational damage. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face heightened compliance risks under GDPR if personal data is compromised through such attacks. The vulnerability's exploitation could also facilitate lateral movement within networks, enabling attackers to escalate privileges or deploy further malware. The threat is amplified in environments where administrator credentials are weak, reused, or susceptible to phishing, increasing the likelihood of initial compromise.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately review and restrict administrator access to the XWiki Global Preferences panel, enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. Administrators should audit the HTTP Meta Info, Footer Copyright, and Footer Version fields for any suspicious or unauthorized content and sanitize or remove any injected scripts. Organizations should implement strict input validation and output encoding controls within their XWiki instances, either by applying vendor patches once available or by deploying web application firewalls (WAFs) with custom rules to detect and block malicious script injections and payloads. Regular monitoring of administrator activities and logs can help detect anomalous behavior indicative of exploitation attempts. Additionally, organizations should educate administrators on secure credential management and phishing awareness to prevent initial access. Where feasible, isolating XWiki instances behind VPNs or restricting access to trusted networks can further reduce exposure. Finally, organizations should stay updated with vendor advisories for official patches and apply them promptly upon release.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68a5e397ad5a09ad0005f178
Added to database: 8/20/2025, 3:02:47 PM
Last enriched: 8/20/2025, 3:18:13 PM
Last updated: 8/21/2025, 7:44:08 AM
Views: 4
Related Threats
CVE-2025-9308: Inefficient Regular Expression Complexity in yarnpkg Yarn
MediumCVE-2025-9307: SQL Injection in PHPGurukul Online Course Registration
MediumCVE-2025-57753: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in sapphi-red vite-plugin-static-copy
MediumCVE-2025-8592: CWE-352 Cross-Site Request Forgery (CSRF) in wpzoom Inspiro
HighCVE-2025-52395: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.