Skip to main content

CVE-2025-55727: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwikisas xwiki-pro-macros

Critical
VulnerabilityCVE-2025-55727cvecve-2025-55727cwe-95
Published: Tue Sep 09 2025 (09/09/2025, 18:31:08 UTC)
Source: CVE Database V5
Vendor/Project: xwikisas
Product: xwiki-pro-macros

Description

XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the width parameter in the column macro allows remote code execution for any user who can edit any page or who can access the CKEditor converter. The width parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution when the macro has been installed by a user with programming right, or it at least allows executing Velocity code as the wiki admin. Version 1.26.5 contains a patch for the issue.

AI-Powered Analysis

AILast updated: 09/09/2025, 18:40:42 UTC

Technical Analysis

CVE-2025-55727 is a critical remote code execution vulnerability affecting the xwiki-pro-macros component of the XWiki platform, specifically in versions from 1.0 up to but not including 1.26.5. The vulnerability arises due to improper neutralization of directives in dynamically evaluated code (CWE-95), commonly known as 'Eval Injection.' The root cause is the lack of escaping for the 'width' parameter in the column macro of the XWiki Remote Macros plugin, which is used for migrating content from Confluence. This parameter is processed without proper sanitization in XWiki syntax, allowing an attacker with edit permissions on any page or access to the CKEditor converter to inject malicious XWiki syntax. If the macro is installed by a user with programming rights, this injection can escalate to remote code execution on the server. Even without programming rights, an attacker can execute Velocity code with wiki admin privileges, leading to full compromise of the wiki instance. The vulnerability is exploitable remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The flaw affects the confidentiality, integrity, and availability of the system, as attackers can execute arbitrary code, potentially leading to data theft, defacement, or denial of service. The issue was patched in version 1.26.5 of xwiki-pro-macros, which properly escapes the 'width' parameter to prevent injection. No known exploits are reported in the wild yet, but the critical severity and ease of exploitation make this a high-risk vulnerability for affected deployments.

Potential Impact

For European organizations using XWiki with the vulnerable xwiki-pro-macros versions, this vulnerability poses a severe risk. Attackers can gain full control over the wiki platform, which often contains sensitive corporate documentation, internal communications, and project data. The ability to execute arbitrary code remotely without authentication means that attackers can compromise the confidentiality of sensitive information, alter or delete critical data, and disrupt business operations by causing service outages. This is particularly impactful for organizations relying on XWiki for knowledge management, compliance documentation, or collaborative workflows. Additionally, compromised wiki servers can be used as pivot points for lateral movement within corporate networks, increasing the risk of broader breaches. The vulnerability also threatens the integrity of information, which can have regulatory and reputational consequences under European data protection laws such as GDPR. Given the critical CVSS score of 10, the potential impact on European enterprises is substantial, especially for sectors like finance, healthcare, government, and critical infrastructure where XWiki might be deployed.

Mitigation Recommendations

European organizations should immediately assess their XWiki deployments to identify if xwiki-pro-macros versions prior to 1.26.5 are in use. The primary mitigation is to upgrade the xwiki-pro-macros plugin to version 1.26.5 or later, which contains the patch that properly escapes the 'width' parameter. Until the upgrade is applied, organizations should restrict edit permissions and CKEditor converter access to trusted users only, ideally limiting programming rights to a minimal set of administrators. Implementing strict input validation and sanitization policies for wiki content can reduce risk, although this is a partial mitigation. Monitoring wiki logs for unusual syntax injection patterns or unexpected Velocity code execution attempts can help detect exploitation attempts. Network-level protections such as web application firewalls (WAFs) can be tuned to detect and block suspicious payloads targeting the vulnerable macro parameters. Finally, organizations should ensure that backup and recovery procedures are in place to restore integrity in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-14T22:31:17.681Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0749c2bd84bebdc41b972

Added to database: 9/9/2025, 6:40:28 PM

Last enriched: 9/9/2025, 6:40:42 PM

Last updated: 9/9/2025, 6:41:07 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats