CVE-2025-55727: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwikisas xwiki-pro-macros
XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the width parameter in the column macro allows remote code execution for any user who can edit any page or who can access the CKEditor converter. The width parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution when the macro has been installed by a user with programming right, or it at least allows executing Velocity code as the wiki admin. Version 1.26.5 contains a patch for the issue.
AI Analysis
Technical Summary
CVE-2025-55727 is a critical remote code execution vulnerability affecting the xwiki-pro-macros component of the XWiki platform, specifically in versions from 1.0 up to but not including 1.26.5. The vulnerability arises due to improper neutralization of directives in dynamically evaluated code (CWE-95), commonly known as 'Eval Injection.' The root cause is the lack of escaping for the 'width' parameter in the column macro of the XWiki Remote Macros plugin, which is used for migrating content from Confluence. This parameter is processed without proper sanitization in XWiki syntax, allowing an attacker with edit permissions on any page or access to the CKEditor converter to inject malicious XWiki syntax. If the macro is installed by a user with programming rights, this injection can escalate to remote code execution on the server. Even without programming rights, an attacker can execute Velocity code with wiki admin privileges, leading to full compromise of the wiki instance. The vulnerability is exploitable remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The flaw affects the confidentiality, integrity, and availability of the system, as attackers can execute arbitrary code, potentially leading to data theft, defacement, or denial of service. The issue was patched in version 1.26.5 of xwiki-pro-macros, which properly escapes the 'width' parameter to prevent injection. No known exploits are reported in the wild yet, but the critical severity and ease of exploitation make this a high-risk vulnerability for affected deployments.
Potential Impact
For European organizations using XWiki with the vulnerable xwiki-pro-macros versions, this vulnerability poses a severe risk. Attackers can gain full control over the wiki platform, which often contains sensitive corporate documentation, internal communications, and project data. The ability to execute arbitrary code remotely without authentication means that attackers can compromise the confidentiality of sensitive information, alter or delete critical data, and disrupt business operations by causing service outages. This is particularly impactful for organizations relying on XWiki for knowledge management, compliance documentation, or collaborative workflows. Additionally, compromised wiki servers can be used as pivot points for lateral movement within corporate networks, increasing the risk of broader breaches. The vulnerability also threatens the integrity of information, which can have regulatory and reputational consequences under European data protection laws such as GDPR. Given the critical CVSS score of 10, the potential impact on European enterprises is substantial, especially for sectors like finance, healthcare, government, and critical infrastructure where XWiki might be deployed.
Mitigation Recommendations
European organizations should immediately assess their XWiki deployments to identify if xwiki-pro-macros versions prior to 1.26.5 are in use. The primary mitigation is to upgrade the xwiki-pro-macros plugin to version 1.26.5 or later, which contains the patch that properly escapes the 'width' parameter. Until the upgrade is applied, organizations should restrict edit permissions and CKEditor converter access to trusted users only, ideally limiting programming rights to a minimal set of administrators. Implementing strict input validation and sanitization policies for wiki content can reduce risk, although this is a partial mitigation. Monitoring wiki logs for unusual syntax injection patterns or unexpected Velocity code execution attempts can help detect exploitation attempts. Network-level protections such as web application firewalls (WAFs) can be tuned to detect and block suspicious payloads targeting the vulnerable macro parameters. Finally, organizations should ensure that backup and recovery procedures are in place to restore integrity in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2025-55727: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwikisas xwiki-pro-macros
Description
XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the width parameter in the column macro allows remote code execution for any user who can edit any page or who can access the CKEditor converter. The width parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution when the macro has been installed by a user with programming right, or it at least allows executing Velocity code as the wiki admin. Version 1.26.5 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-55727 is a critical remote code execution vulnerability affecting the xwiki-pro-macros component of the XWiki platform, specifically in versions from 1.0 up to but not including 1.26.5. The vulnerability arises due to improper neutralization of directives in dynamically evaluated code (CWE-95), commonly known as 'Eval Injection.' The root cause is the lack of escaping for the 'width' parameter in the column macro of the XWiki Remote Macros plugin, which is used for migrating content from Confluence. This parameter is processed without proper sanitization in XWiki syntax, allowing an attacker with edit permissions on any page or access to the CKEditor converter to inject malicious XWiki syntax. If the macro is installed by a user with programming rights, this injection can escalate to remote code execution on the server. Even without programming rights, an attacker can execute Velocity code with wiki admin privileges, leading to full compromise of the wiki instance. The vulnerability is exploitable remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The flaw affects the confidentiality, integrity, and availability of the system, as attackers can execute arbitrary code, potentially leading to data theft, defacement, or denial of service. The issue was patched in version 1.26.5 of xwiki-pro-macros, which properly escapes the 'width' parameter to prevent injection. No known exploits are reported in the wild yet, but the critical severity and ease of exploitation make this a high-risk vulnerability for affected deployments.
Potential Impact
For European organizations using XWiki with the vulnerable xwiki-pro-macros versions, this vulnerability poses a severe risk. Attackers can gain full control over the wiki platform, which often contains sensitive corporate documentation, internal communications, and project data. The ability to execute arbitrary code remotely without authentication means that attackers can compromise the confidentiality of sensitive information, alter or delete critical data, and disrupt business operations by causing service outages. This is particularly impactful for organizations relying on XWiki for knowledge management, compliance documentation, or collaborative workflows. Additionally, compromised wiki servers can be used as pivot points for lateral movement within corporate networks, increasing the risk of broader breaches. The vulnerability also threatens the integrity of information, which can have regulatory and reputational consequences under European data protection laws such as GDPR. Given the critical CVSS score of 10, the potential impact on European enterprises is substantial, especially for sectors like finance, healthcare, government, and critical infrastructure where XWiki might be deployed.
Mitigation Recommendations
European organizations should immediately assess their XWiki deployments to identify if xwiki-pro-macros versions prior to 1.26.5 are in use. The primary mitigation is to upgrade the xwiki-pro-macros plugin to version 1.26.5 or later, which contains the patch that properly escapes the 'width' parameter. Until the upgrade is applied, organizations should restrict edit permissions and CKEditor converter access to trusted users only, ideally limiting programming rights to a minimal set of administrators. Implementing strict input validation and sanitization policies for wiki content can reduce risk, although this is a partial mitigation. Monitoring wiki logs for unusual syntax injection patterns or unexpected Velocity code execution attempts can help detect exploitation attempts. Network-level protections such as web application firewalls (WAFs) can be tuned to detect and block suspicious payloads targeting the vulnerable macro parameters. Finally, organizations should ensure that backup and recovery procedures are in place to restore integrity in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-14T22:31:17.681Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c0749c2bd84bebdc41b972
Added to database: 9/9/2025, 6:40:28 PM
Last enriched: 9/9/2025, 6:40:42 PM
Last updated: 9/9/2025, 6:41:07 PM
Views: 2
Related Threats
CVE-2025-58435: CWE-262: Not Using Password Aging in OSC ondemand
MediumCVE-2025-9111: CWE-79 Cross-Site Scripting (XSS) in AI ChatBot for WordPress
MediumCVE-2025-8889: CWE-434 Unrestricted Upload of File with Dangerous Type in Compress & Upload
MediumCVE-2025-58430: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in knadh listmonk
HighCVE-2025-36011: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in IBM Jazz for Service Management
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.