CVE-2025-55728: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwikisas xwiki-pro-macros
XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the classes parameter in the panel macro allows remote code execution for any user who can edit any page The classes parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution. Version 1.26.5 contains a patch for the issue.
AI Analysis
Technical Summary
CVE-2025-55728 is a critical remote code execution vulnerability affecting the xwiki-pro-macros component of the XWiki platform, specifically in versions from 1.0 up to but not including 1.26.5. The vulnerability arises from improper neutralization of directives in dynamically evaluated code (CWE-95), commonly referred to as 'eval injection.' The root cause is the lack of proper escaping of the 'classes' parameter within the 'panel' macro, which is used in XWiki syntax rendering. Because the 'classes' parameter is incorporated without escaping, an attacker with permissions to edit any page can inject malicious XWiki syntax that gets evaluated dynamically, leading to remote code execution on the server hosting the XWiki instance. This vulnerability does not require authentication or user interaction beyond the ability to edit pages, which may be granted to a broad set of users in some deployments. The CVSS v3.1 score is 10.0 (critical), reflecting the vulnerability's network attack vector, low attack complexity, no privileges required, no user interaction, and complete impact on confidentiality, integrity, and availability. The issue was patched in version 1.26.5 of xwiki-pro-macros. No known exploits have been reported in the wild as of the publication date (September 9, 2025). However, the severity and ease of exploitation make this a high-risk vulnerability for any affected deployments that have not applied the patch.
Potential Impact
For European organizations using XWiki with the vulnerable xwiki-pro-macros versions, this vulnerability poses a severe risk. Successful exploitation allows an attacker to execute arbitrary code remotely on the server, potentially leading to full system compromise, data theft, data manipulation, or service disruption. Given that XWiki is often used for internal documentation, collaboration, and knowledge management, compromise could expose sensitive corporate information, intellectual property, or internal processes. The vulnerability's exploitation requires only the ability to edit a page, which may be granted to a wide range of users, increasing the attack surface. In regulated industries common in Europe, such as finance, healthcare, and government, such a breach could lead to significant compliance violations under GDPR and other data protection laws, resulting in heavy fines and reputational damage. Additionally, the ability to execute code remotely could allow attackers to pivot within the network, escalating privileges or deploying ransomware. The lack of known exploits in the wild does not diminish the urgency, as public disclosure and a critical CVSS score may prompt attackers to develop exploits rapidly.
Mitigation Recommendations
European organizations should immediately verify their XWiki deployments for the presence of xwiki-pro-macros versions between 1.0 and 1.26.4 inclusive. The primary mitigation is to upgrade xwiki-pro-macros to version 1.26.5 or later, which contains the patch for this vulnerability. If immediate upgrade is not feasible, organizations should restrict page editing permissions to trusted users only, minimizing the risk of malicious edits. Additionally, implementing strict input validation and output escaping on the 'classes' parameter in custom macros or extensions can reduce risk. Monitoring and logging of page edits should be enhanced to detect suspicious activity. Network segmentation and application-layer firewalls can help contain potential exploitation attempts. Finally, organizations should conduct internal audits and penetration tests focusing on XWiki instances to identify any signs of compromise or attempted exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-55728: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwikisas xwiki-pro-macros
Description
XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the classes parameter in the panel macro allows remote code execution for any user who can edit any page The classes parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution. Version 1.26.5 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-55728 is a critical remote code execution vulnerability affecting the xwiki-pro-macros component of the XWiki platform, specifically in versions from 1.0 up to but not including 1.26.5. The vulnerability arises from improper neutralization of directives in dynamically evaluated code (CWE-95), commonly referred to as 'eval injection.' The root cause is the lack of proper escaping of the 'classes' parameter within the 'panel' macro, which is used in XWiki syntax rendering. Because the 'classes' parameter is incorporated without escaping, an attacker with permissions to edit any page can inject malicious XWiki syntax that gets evaluated dynamically, leading to remote code execution on the server hosting the XWiki instance. This vulnerability does not require authentication or user interaction beyond the ability to edit pages, which may be granted to a broad set of users in some deployments. The CVSS v3.1 score is 10.0 (critical), reflecting the vulnerability's network attack vector, low attack complexity, no privileges required, no user interaction, and complete impact on confidentiality, integrity, and availability. The issue was patched in version 1.26.5 of xwiki-pro-macros. No known exploits have been reported in the wild as of the publication date (September 9, 2025). However, the severity and ease of exploitation make this a high-risk vulnerability for any affected deployments that have not applied the patch.
Potential Impact
For European organizations using XWiki with the vulnerable xwiki-pro-macros versions, this vulnerability poses a severe risk. Successful exploitation allows an attacker to execute arbitrary code remotely on the server, potentially leading to full system compromise, data theft, data manipulation, or service disruption. Given that XWiki is often used for internal documentation, collaboration, and knowledge management, compromise could expose sensitive corporate information, intellectual property, or internal processes. The vulnerability's exploitation requires only the ability to edit a page, which may be granted to a wide range of users, increasing the attack surface. In regulated industries common in Europe, such as finance, healthcare, and government, such a breach could lead to significant compliance violations under GDPR and other data protection laws, resulting in heavy fines and reputational damage. Additionally, the ability to execute code remotely could allow attackers to pivot within the network, escalating privileges or deploying ransomware. The lack of known exploits in the wild does not diminish the urgency, as public disclosure and a critical CVSS score may prompt attackers to develop exploits rapidly.
Mitigation Recommendations
European organizations should immediately verify their XWiki deployments for the presence of xwiki-pro-macros versions between 1.0 and 1.26.4 inclusive. The primary mitigation is to upgrade xwiki-pro-macros to version 1.26.5 or later, which contains the patch for this vulnerability. If immediate upgrade is not feasible, organizations should restrict page editing permissions to trusted users only, minimizing the risk of malicious edits. Additionally, implementing strict input validation and output escaping on the 'classes' parameter in custom macros or extensions can reduce risk. Monitoring and logging of page edits should be enhanced to detect suspicious activity. Network segmentation and application-layer firewalls can help contain potential exploitation attempts. Finally, organizations should conduct internal audits and penetration tests focusing on XWiki instances to identify any signs of compromise or attempted exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-14T22:31:17.682Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c076b59256f7c60d152ee2
Added to database: 9/9/2025, 6:49:25 PM
Last enriched: 9/9/2025, 6:53:44 PM
Last updated: 9/10/2025, 4:07:21 AM
Views: 5
Related Threats
CVE-2025-8388: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ideaboxcreations PowerPack Elementor Addons (Free Widgets, Extensions and Templates)
MediumCVE-2025-59038: CWE-506: Embedded Malicious Code in prebid Prebid.js
HighCVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.