CVE-2025-55729: CWE-116: Improper Encoding or Escaping of Output in xwikisas xwiki-pro-macros
XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the ac:type in the ConfluenceLayoutSection macro allows remote code execution for any user who can edit any page The classes parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution. Version 1.26.5 has a fix for the issue.
AI Analysis
Technical Summary
CVE-2025-55729 is a critical remote code execution vulnerability affecting the xwiki-pro-macros product from the xwikisas project, specifically versions from 1.0 up to but not including 1.26.5. The vulnerability arises from improper encoding or escaping of output (CWE-116) in the handling of the ac:type attribute within the ConfluenceLayoutSection macro. This macro is used to facilitate content migration from Confluence to XWiki. The vulnerability stems from the fact that the classes parameter is used without proper escaping in XWiki syntax, which allows an attacker with edit permissions on any page to inject malicious XWiki syntax. This injection can lead to remote code execution (RCE) on the server hosting the XWiki instance. The vulnerability is exploitable without authentication (PR:N) and requires no user interaction (UI:N), making it highly accessible to attackers who can edit pages. The CVSS v3.1 base score is 10.0, indicating a critical severity with full impact on confidentiality, integrity, and availability, and network attack vector. The issue was fixed in version 1.26.5 by properly escaping the ac:type and classes parameters to prevent syntax injection. No known exploits in the wild have been reported yet, but the ease of exploitation and severity make this a high-risk vulnerability for organizations using affected versions of xwiki-pro-macros.
Potential Impact
For European organizations using XWiki with the xwiki-pro-macros plugin versions prior to 1.26.5, this vulnerability poses a severe risk. An attacker with edit permissions—which may be granted to a wide range of users in collaborative environments—can execute arbitrary code on the server. This can lead to full system compromise, data theft, data manipulation, or service disruption. Given that XWiki is often used for internal documentation, knowledge bases, and collaboration, exploitation could expose sensitive corporate information or disrupt critical business processes. The vulnerability's ability to be exploited remotely without authentication increases the attack surface, especially in organizations with publicly accessible or poorly segmented XWiki instances. Additionally, the scope of impact extends to the entire server environment, potentially affecting other integrated systems or services. The critical severity and ease of exploitation necessitate immediate attention to prevent potential data breaches and operational impacts.
Mitigation Recommendations
European organizations should immediately upgrade xwiki-pro-macros to version 1.26.5 or later, where the vulnerability is patched. Until the upgrade can be performed, organizations should restrict edit permissions on XWiki pages to trusted users only, minimizing the risk of malicious syntax injection. Implement network segmentation and firewall rules to limit access to the XWiki server, especially from untrusted networks. Conduct thorough audits of user permissions and review page histories for suspicious edits. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to inject malicious XWiki syntax or unusual payloads targeting the ConfluenceLayoutSection macro. Regularly monitor logs for anomalous activities related to page edits or macro usage. Finally, integrate vulnerability scanning and patch management processes to ensure timely updates of XWiki components and related plugins.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-55729: CWE-116: Improper Encoding or Escaping of Output in xwikisas xwiki-pro-macros
Description
XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the ac:type in the ConfluenceLayoutSection macro allows remote code execution for any user who can edit any page The classes parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution. Version 1.26.5 has a fix for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-55729 is a critical remote code execution vulnerability affecting the xwiki-pro-macros product from the xwikisas project, specifically versions from 1.0 up to but not including 1.26.5. The vulnerability arises from improper encoding or escaping of output (CWE-116) in the handling of the ac:type attribute within the ConfluenceLayoutSection macro. This macro is used to facilitate content migration from Confluence to XWiki. The vulnerability stems from the fact that the classes parameter is used without proper escaping in XWiki syntax, which allows an attacker with edit permissions on any page to inject malicious XWiki syntax. This injection can lead to remote code execution (RCE) on the server hosting the XWiki instance. The vulnerability is exploitable without authentication (PR:N) and requires no user interaction (UI:N), making it highly accessible to attackers who can edit pages. The CVSS v3.1 base score is 10.0, indicating a critical severity with full impact on confidentiality, integrity, and availability, and network attack vector. The issue was fixed in version 1.26.5 by properly escaping the ac:type and classes parameters to prevent syntax injection. No known exploits in the wild have been reported yet, but the ease of exploitation and severity make this a high-risk vulnerability for organizations using affected versions of xwiki-pro-macros.
Potential Impact
For European organizations using XWiki with the xwiki-pro-macros plugin versions prior to 1.26.5, this vulnerability poses a severe risk. An attacker with edit permissions—which may be granted to a wide range of users in collaborative environments—can execute arbitrary code on the server. This can lead to full system compromise, data theft, data manipulation, or service disruption. Given that XWiki is often used for internal documentation, knowledge bases, and collaboration, exploitation could expose sensitive corporate information or disrupt critical business processes. The vulnerability's ability to be exploited remotely without authentication increases the attack surface, especially in organizations with publicly accessible or poorly segmented XWiki instances. Additionally, the scope of impact extends to the entire server environment, potentially affecting other integrated systems or services. The critical severity and ease of exploitation necessitate immediate attention to prevent potential data breaches and operational impacts.
Mitigation Recommendations
European organizations should immediately upgrade xwiki-pro-macros to version 1.26.5 or later, where the vulnerability is patched. Until the upgrade can be performed, organizations should restrict edit permissions on XWiki pages to trusted users only, minimizing the risk of malicious syntax injection. Implement network segmentation and firewall rules to limit access to the XWiki server, especially from untrusted networks. Conduct thorough audits of user permissions and review page histories for suspicious edits. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to inject malicious XWiki syntax or unusual payloads targeting the ConfluenceLayoutSection macro. Regularly monitor logs for anomalous activities related to page edits or macro usage. Finally, integrate vulnerability scanning and patch management processes to ensure timely updates of XWiki components and related plugins.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-14T22:31:17.682Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c0782035242cb3d0f995aa
Added to database: 9/9/2025, 6:55:28 PM
Last enriched: 9/9/2025, 6:55:56 PM
Last updated: 9/10/2025, 3:10:20 AM
Views: 6
Related Threats
CVE-2025-59038: CWE-506: Embedded Malicious Code in prebid Prebid.js
HighCVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21409: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.