CVE-2025-51991: n/a
XWiki through version 17.3.0 is vulnerable to Server-Side Template Injection (SSTI) in the Administration interface, specifically within the HTTP Meta Info field of the Global Preferences Presentation section. An authenticated administrator can inject crafted Apache Velocity template code, which is rendered on the server side without proper validation or sandboxing. This enables the execution of arbitrary template logic, which may expose internal server information or, in specific configurations, lead to further exploitation such as remote code execution or sensitive data leakage. The vulnerability resides in improper handling of dynamic template rendering within user-supplied configuration fields.
AI Analysis
Technical Summary
CVE-2025-51991 is a Server-Side Template Injection (SSTI) vulnerability affecting XWiki versions up to and including 17.3.0. The vulnerability exists in the Administration interface, specifically within the HTTP Meta Info field of the Global Preferences Presentation section. An authenticated administrator user can inject malicious Apache Velocity template code into this field. Because the injected template code is rendered server-side without proper input validation or sandboxing, it allows execution of arbitrary template logic. This can lead to exposure of sensitive internal server information, such as environment variables or configuration details. In certain configurations, the vulnerability could be escalated to remote code execution (RCE), enabling an attacker to execute arbitrary commands on the server. The root cause is improper handling of dynamic template rendering in user-supplied configuration fields, which allows crafted templates to bypass security controls. Although exploitation requires administrator authentication, the impact is significant given the potential for data leakage and system compromise. No known public exploits have been reported yet, and no CVSS score has been assigned. The vulnerability was publicly disclosed on August 20, 2025.
Potential Impact
For European organizations using XWiki as a collaboration or knowledge management platform, this vulnerability poses a serious risk. If an attacker gains administrator credentials—whether through phishing, credential reuse, or insider threat—they could exploit this SSTI flaw to execute arbitrary code or extract sensitive data from the server. This could lead to unauthorized access to confidential corporate information, disruption of business operations, and potential lateral movement within the network. Organizations in regulated sectors such as finance, healthcare, and government are particularly at risk due to the sensitivity of the data stored in XWiki instances. The ability to execute arbitrary code could also allow attackers to deploy malware or ransomware, amplifying the impact. Since the vulnerability requires administrator authentication, the threat is somewhat mitigated by strong access controls, but the risk remains high if credentials are compromised or insufficiently protected.
Mitigation Recommendations
European organizations should immediately review and restrict administrator access to XWiki instances, enforcing strong authentication mechanisms such as multi-factor authentication (MFA). Administrators should be trained to recognize phishing and social engineering attempts to protect credentials. It is critical to monitor and audit administrative actions within XWiki to detect suspicious behavior. Although no official patch links are provided yet, organizations should closely monitor XWiki vendor advisories for patches addressing this vulnerability and apply them promptly once available. As a temporary mitigation, administrators can avoid modifying the HTTP Meta Info field or disable the Global Preferences Presentation section if feasible. Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious Velocity template syntax in HTTP requests may provide additional protection. Regular backups and incident response plans should be updated to prepare for potential exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-51991: n/a
Description
XWiki through version 17.3.0 is vulnerable to Server-Side Template Injection (SSTI) in the Administration interface, specifically within the HTTP Meta Info field of the Global Preferences Presentation section. An authenticated administrator can inject crafted Apache Velocity template code, which is rendered on the server side without proper validation or sandboxing. This enables the execution of arbitrary template logic, which may expose internal server information or, in specific configurations, lead to further exploitation such as remote code execution or sensitive data leakage. The vulnerability resides in improper handling of dynamic template rendering within user-supplied configuration fields.
AI-Powered Analysis
Technical Analysis
CVE-2025-51991 is a Server-Side Template Injection (SSTI) vulnerability affecting XWiki versions up to and including 17.3.0. The vulnerability exists in the Administration interface, specifically within the HTTP Meta Info field of the Global Preferences Presentation section. An authenticated administrator user can inject malicious Apache Velocity template code into this field. Because the injected template code is rendered server-side without proper input validation or sandboxing, it allows execution of arbitrary template logic. This can lead to exposure of sensitive internal server information, such as environment variables or configuration details. In certain configurations, the vulnerability could be escalated to remote code execution (RCE), enabling an attacker to execute arbitrary commands on the server. The root cause is improper handling of dynamic template rendering in user-supplied configuration fields, which allows crafted templates to bypass security controls. Although exploitation requires administrator authentication, the impact is significant given the potential for data leakage and system compromise. No known public exploits have been reported yet, and no CVSS score has been assigned. The vulnerability was publicly disclosed on August 20, 2025.
Potential Impact
For European organizations using XWiki as a collaboration or knowledge management platform, this vulnerability poses a serious risk. If an attacker gains administrator credentials—whether through phishing, credential reuse, or insider threat—they could exploit this SSTI flaw to execute arbitrary code or extract sensitive data from the server. This could lead to unauthorized access to confidential corporate information, disruption of business operations, and potential lateral movement within the network. Organizations in regulated sectors such as finance, healthcare, and government are particularly at risk due to the sensitivity of the data stored in XWiki instances. The ability to execute arbitrary code could also allow attackers to deploy malware or ransomware, amplifying the impact. Since the vulnerability requires administrator authentication, the threat is somewhat mitigated by strong access controls, but the risk remains high if credentials are compromised or insufficiently protected.
Mitigation Recommendations
European organizations should immediately review and restrict administrator access to XWiki instances, enforcing strong authentication mechanisms such as multi-factor authentication (MFA). Administrators should be trained to recognize phishing and social engineering attempts to protect credentials. It is critical to monitor and audit administrative actions within XWiki to detect suspicious behavior. Although no official patch links are provided yet, organizations should closely monitor XWiki vendor advisories for patches addressing this vulnerability and apply them promptly once available. As a temporary mitigation, administrators can avoid modifying the HTTP Meta Info field or disable the Global Preferences Presentation section if feasible. Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious Velocity template syntax in HTTP requests may provide additional protection. Regular backups and incident response plans should be updated to prepare for potential exploitation scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68a5e397ad5a09ad0005f17b
Added to database: 8/20/2025, 3:02:47 PM
Last enriched: 8/20/2025, 3:17:59 PM
Last updated: 8/22/2025, 12:34:56 AM
Views: 6
Related Threats
CVE-2025-43752: CWE-770 Allocation of Resources Without Limits or Throttling in Liferay Portal
MediumCVE-2025-43753: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
LowCVE-2025-51606: n/a
UnknownCVE-2025-43747: CWE-918 Server-Side Request Forgery (SSRF) in Liferay DXP
MediumCVE-2025-27714: CWE-434 in INFINITT Healthcare INFINITT PACS System Manager
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.