CVE-2025-55747: CWE-23: Relative Path Traversal in xwiki xwiki-platform
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 6.1-milestone-2 through 16.10.6, configuration files are accessible through the webjars API. This is fixed in version 16.10.7.
AI Analysis
Technical Summary
CVE-2025-55747 is a critical security vulnerability classified as CWE-23, a Relative Path Traversal flaw, affecting the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. This vulnerability exists in versions from 6.1-milestone-2 up to, but not including, 16.10.7. The core issue is that configuration files within the platform are accessible via the webjars API due to improper validation of file paths. This allows an unauthenticated attacker to exploit the relative path traversal flaw to access sensitive configuration files that should not be exposed publicly. The vulnerability has a CVSS 4.0 base score of 9.3, indicating critical severity. The vector indicates that the attack can be performed remotely over the network without any authentication or user interaction, with low attack complexity. The impact on confidentiality, integrity, and availability is high, as attackers can read sensitive configuration files that may contain credentials, system settings, or other critical information, potentially leading to further compromise of the system or lateral movement within the network. The issue was resolved in version 16.10.7 of XWiki Platform by properly restricting access to configuration files through the webjars API. No known exploits are currently reported in the wild, but the ease of exploitation and critical impact make this vulnerability a high priority for patching.
Potential Impact
For European organizations using XWiki Platform versions between 6.1-milestone-2 and 16.10.6, this vulnerability poses a significant risk. Exposure of configuration files can lead to leakage of sensitive information such as database credentials, API keys, or internal configuration details, which can be leveraged by attackers to escalate privileges, execute further attacks, or disrupt services. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased compliance risks and potential legal consequences if such data is compromised. Additionally, the vulnerability's remote and unauthenticated nature means that attackers can exploit it without insider access, increasing the threat surface. Given the criticality, exploitation could lead to data breaches, service interruptions, and reputational damage. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately verify their use of the XWiki Platform and identify affected versions. The primary mitigation is to upgrade all instances of XWiki Platform to version 16.10.7 or later, where the vulnerability is fixed. If immediate upgrading is not feasible, organizations should implement strict network-level access controls to restrict access to the webjars API endpoints, ideally limiting them to trusted internal networks only. Web application firewalls (WAFs) can be configured to detect and block path traversal attempts targeting the webjars API. Additionally, auditing and monitoring access logs for unusual requests to configuration files can help detect exploitation attempts. Organizations should also review and rotate any credentials or sensitive information stored in configuration files as a precautionary measure. Finally, ensure that all security patches and updates are applied promptly and maintain an inventory of software versions to facilitate rapid response to vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Austria
CVE-2025-55747: CWE-23: Relative Path Traversal in xwiki xwiki-platform
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 6.1-milestone-2 through 16.10.6, configuration files are accessible through the webjars API. This is fixed in version 16.10.7.
AI-Powered Analysis
Technical Analysis
CVE-2025-55747 is a critical security vulnerability classified as CWE-23, a Relative Path Traversal flaw, affecting the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. This vulnerability exists in versions from 6.1-milestone-2 up to, but not including, 16.10.7. The core issue is that configuration files within the platform are accessible via the webjars API due to improper validation of file paths. This allows an unauthenticated attacker to exploit the relative path traversal flaw to access sensitive configuration files that should not be exposed publicly. The vulnerability has a CVSS 4.0 base score of 9.3, indicating critical severity. The vector indicates that the attack can be performed remotely over the network without any authentication or user interaction, with low attack complexity. The impact on confidentiality, integrity, and availability is high, as attackers can read sensitive configuration files that may contain credentials, system settings, or other critical information, potentially leading to further compromise of the system or lateral movement within the network. The issue was resolved in version 16.10.7 of XWiki Platform by properly restricting access to configuration files through the webjars API. No known exploits are currently reported in the wild, but the ease of exploitation and critical impact make this vulnerability a high priority for patching.
Potential Impact
For European organizations using XWiki Platform versions between 6.1-milestone-2 and 16.10.6, this vulnerability poses a significant risk. Exposure of configuration files can lead to leakage of sensitive information such as database credentials, API keys, or internal configuration details, which can be leveraged by attackers to escalate privileges, execute further attacks, or disrupt services. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased compliance risks and potential legal consequences if such data is compromised. Additionally, the vulnerability's remote and unauthenticated nature means that attackers can exploit it without insider access, increasing the threat surface. Given the criticality, exploitation could lead to data breaches, service interruptions, and reputational damage. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately verify their use of the XWiki Platform and identify affected versions. The primary mitigation is to upgrade all instances of XWiki Platform to version 16.10.7 or later, where the vulnerability is fixed. If immediate upgrading is not feasible, organizations should implement strict network-level access controls to restrict access to the webjars API endpoints, ideally limiting them to trusted internal networks only. Web application firewalls (WAFs) can be configured to detect and block path traversal attempts targeting the webjars API. Additionally, auditing and monitoring access logs for unusual requests to configuration files can help detect exploitation attempts. Organizations should also review and rotate any credentials or sensitive information stored in configuration files as a precautionary measure. Finally, ensure that all security patches and updates are applied promptly and maintain an inventory of software versions to facilitate rapid response to vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-14T22:31:17.685Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b8a5f1ad5a09ad00fa3009
Added to database: 9/3/2025, 8:32:49 PM
Last enriched: 9/3/2025, 8:48:17 PM
Last updated: 9/5/2025, 12:03:46 AM
Views: 23
Related Threats
CVE-2025-58362: CWE-706: Use of Incorrectly-Resolved Name or Reference in honojs hono
HighCVE-2025-58179: CWE-918: Server-Side Request Forgery (SSRF) in withastro astro
HighCVE-2025-55739: CWE-798: Use of Hard-coded Credentials in FreePBX security-reporting
MediumCVE-2025-58352: CWE-613: Insufficient Session Expiration in WeblateOrg weblate
LowCVE-2025-55244: CWE-284: Improper Access Control in Microsoft Azure Bot Service
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.