Skip to main content

CVE-2025-55730: CWE-116: Improper Encoding or Escaping of Output in xwikisas xwiki-pro-macros

Critical
VulnerabilityCVE-2025-55730cvecve-2025-55730cwe-116
Published: Tue Sep 09 2025 (09/09/2025, 18:53:53 UTC)
Source: CVE Database V5
Vendor/Project: xwikisas
Product: xwiki-pro-macros

Description

XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the title in the confluence paste code macro allows remote code execution for any user who can edit any page. The classes parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution. Version 1.26.5 has a fix for the issue.

AI-Powered Analysis

AILast updated: 09/09/2025, 18:55:43 UTC

Technical Analysis

CVE-2025-55730 is a critical remote code execution (RCE) vulnerability affecting the xwiki-pro-macros component of the XWiki platform, specifically the Remote Macros used for migrating content from Confluence. The vulnerability arises due to improper encoding or escaping of output (CWE-116) in the handling of the 'title' attribute within the confluence paste code macro. Versions from 1.0 up to but not including 1.26.5 are affected. The flaw allows any user with page editing permissions to inject malicious XWiki syntax through the 'classes' parameter, which is not properly escaped. This injection leads to execution of arbitrary code on the server hosting XWiki, without requiring authentication beyond edit rights or user interaction. The vulnerability has a CVSS 3.1 base score of 10.0, indicating maximum severity, with attack vector being network-based, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. The issue was fixed in version 1.26.5. No known exploits have been reported in the wild yet. The vulnerability is particularly dangerous because XWiki is often used as a collaborative enterprise wiki platform, and the ability for any editor to execute code remotely can lead to full system compromise, data theft, or disruption of services.

Potential Impact

For European organizations using XWiki with the vulnerable xwiki-pro-macros versions, this vulnerability poses a severe risk. Attackers can gain full control over the affected servers, potentially accessing sensitive corporate data, intellectual property, or internal communications stored in the wiki. This can lead to data breaches violating GDPR regulations, resulting in heavy fines and reputational damage. The integrity of documentation and collaborative content can be compromised, affecting business operations and decision-making. Availability can also be impacted if attackers deploy ransomware or disrupt services. Given the ease of exploitation (no authentication beyond edit rights and no user interaction), insider threats or compromised user accounts can be leveraged to execute attacks. The vulnerability also increases the risk of lateral movement within corporate networks if the wiki server is connected to internal systems. The lack of known exploits in the wild currently provides a window for mitigation, but the critical severity demands immediate action.

Mitigation Recommendations

European organizations should urgently upgrade xwiki-pro-macros to version 1.26.5 or later, where the vulnerability is patched. If immediate upgrade is not feasible, organizations should restrict editing permissions strictly to trusted users, minimizing the number of users who can edit pages. Implement network segmentation to isolate the XWiki server from sensitive internal systems. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious XWiki syntax injection patterns in requests targeting the confluence paste code macro. Conduct thorough audits of user permissions and monitor logs for unusual editing activities or syntax injection attempts. Additionally, consider disabling the vulnerable macro if not essential for business processes. Regularly back up wiki content and system configurations to enable recovery in case of compromise. Finally, keep abreast of any emerging exploit reports and apply security advisories promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-14T22:31:17.682Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0782035242cb3d0f995b0

Added to database: 9/9/2025, 6:55:28 PM

Last enriched: 9/9/2025, 6:55:43 PM

Last updated: 9/10/2025, 4:07:21 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats