CVE-2025-52472: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in xwiki xwiki-platform
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 4.3-milestone-1 and prior to versions 16.10.9, 17.4.2, and 17.5.0, the REST search URL is vulnerable to HQL injection via the `orderField` parameter. The specified value is added twice in the query, though, once in the field list for the select and once in the order clause, so it's not that easy to exploit. The part of the query between the two fields can be enclosed in single quotes to effectively remove them, but the query still needs to remain valid with the query two times in it. This has been patched in versions 17.5.0, 17.4.2, and 16.10.9. No known workarounds are available.
AI Analysis
Technical Summary
CVE-2025-52472 is a critical SQL injection vulnerability identified in the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications. The vulnerability affects versions starting from 4.3-milestone-1 up to versions prior to 16.10.9 and 17.0.0-rc-1 up to before 17.4.2. The issue lies in the REST search URL's orderField parameter, which is susceptible to HQL injection due to improper neutralization of special elements used in SQL commands (CWE-89). Specifically, the orderField parameter is inserted twice into the HQL query: once in the select field list and once in the order clause. This dual insertion complicates exploitation because the injected payload must maintain query validity in both locations. Attackers can enclose the intermediate part of the query in single quotes to neutralize them, but the overall query must remain syntactically valid twice. Despite this complexity, the vulnerability allows unauthenticated remote attackers to execute arbitrary HQL commands, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been patched in versions 16.10.9, 17.4.2, and 17.5.0. The CVSS 4.0 base score is 9.3, reflecting a critical severity with network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild, and no workarounds are currently available, emphasizing the importance of timely patching.
Potential Impact
The impact of CVE-2025-52472 on European organizations is significant due to the critical nature of the vulnerability and the widespread use of XWiki Platform in enterprise and public sector environments. Successful exploitation can lead to unauthorized disclosure of sensitive information, data tampering, or complete system compromise without requiring authentication or user interaction. This could result in data breaches, loss of intellectual property, disruption of business operations, and reputational damage. Given the platform's role in collaboration and documentation, attackers might also leverage this vulnerability to pivot within networks or implant persistent backdoors. European organizations that rely on XWiki for internal knowledge management or customer-facing portals are particularly at risk. The absence of known exploits in the wild currently provides a window for proactive defense, but the critical CVSS score and ease of remote exploitation necessitate urgent remediation to prevent potential attacks.
Mitigation Recommendations
To mitigate CVE-2025-52472, European organizations should immediately upgrade affected XWiki Platform instances to versions 16.10.9, 17.4.2, or 17.5.0 where the vulnerability has been patched. Since no workarounds exist, patching is the primary defense. Organizations should also audit their deployment configurations to ensure that the REST API endpoints are not unnecessarily exposed to untrusted networks. Implement network-level controls such as web application firewalls (WAFs) with custom rules to detect and block suspicious HQL injection patterns targeting the orderField parameter. Conduct thorough logging and monitoring of REST API access to identify anomalous query patterns indicative of exploitation attempts. Additionally, review and restrict permissions for users and services interacting with the XWiki platform to minimize potential damage from a successful attack. Regularly update and test incident response plans to handle potential exploitation scenarios. Finally, educate developers and administrators on secure coding and parameter validation practices to prevent similar injection flaws in custom extensions or integrations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium
CVE-2025-52472: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in xwiki xwiki-platform
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 4.3-milestone-1 and prior to versions 16.10.9, 17.4.2, and 17.5.0, the REST search URL is vulnerable to HQL injection via the `orderField` parameter. The specified value is added twice in the query, though, once in the field list for the select and once in the order clause, so it's not that easy to exploit. The part of the query between the two fields can be enclosed in single quotes to effectively remove them, but the query still needs to remain valid with the query two times in it. This has been patched in versions 17.5.0, 17.4.2, and 16.10.9. No known workarounds are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-52472 is a critical SQL injection vulnerability identified in the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications. The vulnerability affects versions starting from 4.3-milestone-1 up to versions prior to 16.10.9 and 17.0.0-rc-1 up to before 17.4.2. The issue lies in the REST search URL's orderField parameter, which is susceptible to HQL injection due to improper neutralization of special elements used in SQL commands (CWE-89). Specifically, the orderField parameter is inserted twice into the HQL query: once in the select field list and once in the order clause. This dual insertion complicates exploitation because the injected payload must maintain query validity in both locations. Attackers can enclose the intermediate part of the query in single quotes to neutralize them, but the overall query must remain syntactically valid twice. Despite this complexity, the vulnerability allows unauthenticated remote attackers to execute arbitrary HQL commands, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been patched in versions 16.10.9, 17.4.2, and 17.5.0. The CVSS 4.0 base score is 9.3, reflecting a critical severity with network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild, and no workarounds are currently available, emphasizing the importance of timely patching.
Potential Impact
The impact of CVE-2025-52472 on European organizations is significant due to the critical nature of the vulnerability and the widespread use of XWiki Platform in enterprise and public sector environments. Successful exploitation can lead to unauthorized disclosure of sensitive information, data tampering, or complete system compromise without requiring authentication or user interaction. This could result in data breaches, loss of intellectual property, disruption of business operations, and reputational damage. Given the platform's role in collaboration and documentation, attackers might also leverage this vulnerability to pivot within networks or implant persistent backdoors. European organizations that rely on XWiki for internal knowledge management or customer-facing portals are particularly at risk. The absence of known exploits in the wild currently provides a window for proactive defense, but the critical CVSS score and ease of remote exploitation necessitate urgent remediation to prevent potential attacks.
Mitigation Recommendations
To mitigate CVE-2025-52472, European organizations should immediately upgrade affected XWiki Platform instances to versions 16.10.9, 17.4.2, or 17.5.0 where the vulnerability has been patched. Since no workarounds exist, patching is the primary defense. Organizations should also audit their deployment configurations to ensure that the REST API endpoints are not unnecessarily exposed to untrusted networks. Implement network-level controls such as web application firewalls (WAFs) with custom rules to detect and block suspicious HQL injection patterns targeting the orderField parameter. Conduct thorough logging and monitoring of REST API access to identify anomalous query patterns indicative of exploitation attempts. Additionally, review and restrict permissions for users and services interacting with the XWiki platform to minimize potential damage from a successful attack. Regularly update and test incident response plans to handle potential exploitation scenarios. Finally, educate developers and administrators on secure coding and parameter validation practices to prevent similar injection flaws in custom extensions or integrations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-17T02:28:39.716Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e3da725799e49c42c45190
Added to database: 10/6/2025, 3:04:18 PM
Last enriched: 10/6/2025, 3:04:44 PM
Last updated: 10/7/2025, 12:04:19 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11389: Stack-based Buffer Overflow in Tenda AC15
HighCVE-2025-0603: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Callvision Healthcare Callvision Emergency Code
Critical13-Year-Old Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely
CriticalCVE-2025-11388: Stack-based Buffer Overflow in Tenda AC15
HighCVE-2025-11387: Stack-based Buffer Overflow in Tenda AC15
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.