CVE-2025-55747: CWE-23: Relative Path Traversal in xwiki xwiki-platform
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 6.1-milestone-2 through 16.10.6, configuration files are accessible through the webjars API. This is fixed in version 16.10.7.
AI Analysis
Technical Summary
CVE-2025-55747 is a critical security vulnerability classified as CWE-23, a Relative Path Traversal flaw, affecting the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. This vulnerability exists in versions from 6.1-milestone-2 up to, but not including, 16.10.7. The core issue is that configuration files within the platform are accessible via the webjars API due to improper validation of file paths. This allows an unauthenticated attacker to exploit the relative path traversal flaw to access sensitive configuration files that should not be exposed publicly. The vulnerability has a CVSS 4.0 base score of 9.3, indicating critical severity. The vector indicates that the attack can be performed remotely over the network without any authentication or user interaction, with low attack complexity. The impact on confidentiality, integrity, and availability is high, as attackers can read sensitive configuration files that may contain credentials, system settings, or other critical information, potentially leading to further compromise of the system or lateral movement within the network. The issue was resolved in version 16.10.7 of XWiki Platform by properly restricting access to configuration files through the webjars API. No known exploits are currently reported in the wild, but the ease of exploitation and critical impact make this vulnerability a high priority for patching.
Potential Impact
For European organizations using XWiki Platform versions between 6.1-milestone-2 and 16.10.6, this vulnerability poses a significant risk. Exposure of configuration files can lead to leakage of sensitive information such as database credentials, API keys, or internal configuration details, which can be leveraged by attackers to escalate privileges, execute further attacks, or disrupt services. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased compliance risks and potential legal consequences if such data is compromised. Additionally, the vulnerability's remote and unauthenticated nature means that attackers can exploit it without insider access, increasing the threat surface. Given the criticality, exploitation could lead to data breaches, service interruptions, and reputational damage. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately verify their use of the XWiki Platform and identify affected versions. The primary mitigation is to upgrade all instances of XWiki Platform to version 16.10.7 or later, where the vulnerability is fixed. If immediate upgrading is not feasible, organizations should implement strict network-level access controls to restrict access to the webjars API endpoints, ideally limiting them to trusted internal networks only. Web application firewalls (WAFs) can be configured to detect and block path traversal attempts targeting the webjars API. Additionally, auditing and monitoring access logs for unusual requests to configuration files can help detect exploitation attempts. Organizations should also review and rotate any credentials or sensitive information stored in configuration files as a precautionary measure. Finally, ensure that all security patches and updates are applied promptly and maintain an inventory of software versions to facilitate rapid response to vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Austria
CVE-2025-55747: CWE-23: Relative Path Traversal in xwiki xwiki-platform
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 6.1-milestone-2 through 16.10.6, configuration files are accessible through the webjars API. This is fixed in version 16.10.7.
AI-Powered Analysis
Technical Analysis
CVE-2025-55747 is a critical security vulnerability classified as CWE-23, a Relative Path Traversal flaw, affecting the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. This vulnerability exists in versions from 6.1-milestone-2 up to, but not including, 16.10.7. The core issue is that configuration files within the platform are accessible via the webjars API due to improper validation of file paths. This allows an unauthenticated attacker to exploit the relative path traversal flaw to access sensitive configuration files that should not be exposed publicly. The vulnerability has a CVSS 4.0 base score of 9.3, indicating critical severity. The vector indicates that the attack can be performed remotely over the network without any authentication or user interaction, with low attack complexity. The impact on confidentiality, integrity, and availability is high, as attackers can read sensitive configuration files that may contain credentials, system settings, or other critical information, potentially leading to further compromise of the system or lateral movement within the network. The issue was resolved in version 16.10.7 of XWiki Platform by properly restricting access to configuration files through the webjars API. No known exploits are currently reported in the wild, but the ease of exploitation and critical impact make this vulnerability a high priority for patching.
Potential Impact
For European organizations using XWiki Platform versions between 6.1-milestone-2 and 16.10.6, this vulnerability poses a significant risk. Exposure of configuration files can lead to leakage of sensitive information such as database credentials, API keys, or internal configuration details, which can be leveraged by attackers to escalate privileges, execute further attacks, or disrupt services. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased compliance risks and potential legal consequences if such data is compromised. Additionally, the vulnerability's remote and unauthenticated nature means that attackers can exploit it without insider access, increasing the threat surface. Given the criticality, exploitation could lead to data breaches, service interruptions, and reputational damage. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately verify their use of the XWiki Platform and identify affected versions. The primary mitigation is to upgrade all instances of XWiki Platform to version 16.10.7 or later, where the vulnerability is fixed. If immediate upgrading is not feasible, organizations should implement strict network-level access controls to restrict access to the webjars API endpoints, ideally limiting them to trusted internal networks only. Web application firewalls (WAFs) can be configured to detect and block path traversal attempts targeting the webjars API. Additionally, auditing and monitoring access logs for unusual requests to configuration files can help detect exploitation attempts. Organizations should also review and rotate any credentials or sensitive information stored in configuration files as a precautionary measure. Finally, ensure that all security patches and updates are applied promptly and maintain an inventory of software versions to facilitate rapid response to vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-14T22:31:17.685Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b8a5f1ad5a09ad00fa3009
Added to database: 9/3/2025, 8:32:49 PM
Last enriched: 9/3/2025, 8:48:17 PM
Last updated: 10/19/2025, 9:51:22 PM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11946: Cross Site Scripting in LogicalDOC Community Edition
MediumCVE-2025-11945: Cross Site Scripting in toeverything AFFiNE
MediumCVE-2025-11944: SQL Injection in givanz Vvveb
MediumCVE-2025-11943: Use of Default Credentials in 70mai X200
MediumCVE-2025-11942: Missing Authentication in 70mai X200
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.