Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55729: CWE-116: Improper Encoding or Escaping of Output in xwikisas xwiki-pro-macros

0
Critical
VulnerabilityCVE-2025-55729cvecve-2025-55729cwe-116
Published: Tue Sep 09 2025 (09/09/2025, 18:51:47 UTC)
Source: CVE Database V5
Vendor/Project: xwikisas
Product: xwiki-pro-macros

Description

XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the ac:type in the ConfluenceLayoutSection macro allows remote code execution for any user who can edit any page The classes parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution. Version 1.26.5 has a fix for the issue.

AI-Powered Analysis

AILast updated: 09/17/2025, 01:05:37 UTC

Technical Analysis

CVE-2025-55729 is a critical remote code execution vulnerability affecting the xwiki-pro-macros component of the XWiki platform, specifically in the Remote Macros module designed to facilitate content migration from Confluence. The vulnerability arises from improper encoding or escaping of output (CWE-116) in the handling of the ac:type attribute within the ConfluenceLayoutSection macro and the classes parameter used in XWiki syntax. Versions from 1.0 up to but not including 1.26.5 are affected. The lack of proper escaping allows an attacker with edit permissions on any page to inject malicious XWiki syntax, leading to remote code execution without requiring authentication or user interaction. This vulnerability has a CVSS v3.1 base score of 10.0, indicating critical severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and complete impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability is fixed in version 1.26.5. No known exploits are currently reported in the wild, but the ease of exploitation and severity make it a significant threat. The vulnerability allows attackers to execute arbitrary code on the server hosting the XWiki instance, potentially leading to full system compromise, data exfiltration, and disruption of services. The root cause is the failure to properly escape user-controllable input in macros that render content, enabling syntax injection attacks that escalate to remote code execution.

Potential Impact

For European organizations using XWiki with the vulnerable xwiki-pro-macros versions, this vulnerability poses a severe risk. XWiki is often used in enterprise environments for collaborative documentation and knowledge management, including in sectors such as government, education, and private industry. Exploitation could lead to unauthorized access to sensitive internal documentation, intellectual property theft, and disruption of critical collaboration services. The ability to execute arbitrary code remotely without authentication means attackers can pivot within networks, deploy ransomware, or conduct espionage. Given the collaborative nature of XWiki, many users may have edit permissions, increasing the attack surface. The impact extends beyond confidentiality to integrity and availability, potentially causing widespread operational disruption. European organizations subject to strict data protection regulations (e.g., GDPR) may face compliance and legal consequences if breaches occur due to this vulnerability.

Mitigation Recommendations

1. Immediate upgrade to xwiki-pro-macros version 1.26.5 or later, where the vulnerability is patched. 2. Restrict edit permissions on XWiki pages to trusted users only, minimizing the number of users who can exploit the vulnerability. 3. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious macro usage or injection patterns related to the ConfluenceLayoutSection macro. 4. Conduct thorough audits of existing XWiki instances to identify and remediate any unauthorized or suspicious content injections. 5. Employ network segmentation and least privilege principles to limit the potential lateral movement if exploitation occurs. 6. Monitor logs and alerts for unusual activity related to XWiki editing and macro usage. 7. Educate administrators and users about the risks of editing macros and the importance of applying security patches promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-14T22:31:17.682Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0782035242cb3d0f995aa

Added to database: 9/9/2025, 6:55:28 PM

Last enriched: 9/17/2025, 1:05:37 AM

Last updated: 10/30/2025, 4:06:07 PM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats