CVE-2025-55748: CWE-23: Relative Path Traversal in xwiki xwiki-platform
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 4.2-milestone-2 through 16.10.6, configuration files are accessible through jsx and sx endpoints. It's possible to access and read configuration files by using URLs such as `http://localhost:8080/bin/ssx/Main/WebHome?resource=../../WEB-INF/xwiki.cfg&minify=false`. This is fixed in version 16.10.7.
AI Analysis
Technical Summary
CVE-2025-55748 is a critical security vulnerability identified in the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability is classified as a Relative Path Traversal (CWE-23) and affects versions from 4.2-milestone-2 up to, but not including, 16.10.7. The issue arises because configuration files are accessible through the jsx and sx endpoints without proper validation or sanitization of user-supplied input. An attacker can exploit this by crafting a URL that includes relative path sequences (e.g., ../../) to traverse directories and access sensitive configuration files such as xwiki.cfg. For example, a URL like http://localhost:8080/bin/ssx/Main/WebHome?resource=../../WEB-INF/xwiki.cfg&minify=false allows unauthorized reading of configuration files. These configuration files may contain sensitive information including credentials, system settings, or other confidential data. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely over the network. The CVSS 4.0 base score is 9.3 (critical), reflecting the high impact on confidentiality, integrity, and availability, as well as the ease of exploitation. The vulnerability has been fixed in version 16.10.7 of the XWiki Platform. No known exploits are reported in the wild yet, but the critical nature and straightforward exploitation method make it a significant threat to organizations running vulnerable versions of XWiki.
Potential Impact
For European organizations using the XWiki Platform within the affected version range, this vulnerability poses a severe risk. Unauthorized access to configuration files can lead to exposure of sensitive information such as database credentials, API keys, or internal system configurations. This can facilitate further attacks including privilege escalation, data breaches, or disruption of services. Given that XWiki is often used for internal documentation and collaboration, compromise could also lead to leakage of intellectual property or sensitive corporate information. The lack of authentication requirement and remote exploitability means attackers can target exposed XWiki instances over the internet, increasing the risk of widespread exploitation. Additionally, organizations in regulated sectors such as finance, healthcare, or government may face compliance violations and reputational damage if sensitive data is exposed. The vulnerability could also be leveraged to undermine the integrity and availability of the platform, potentially disrupting business operations.
Mitigation Recommendations
European organizations should immediately assess their XWiki Platform deployments to identify affected versions (>=4.2-milestone-2 and <16.10.7). The primary mitigation is to upgrade to version 16.10.7 or later, where the vulnerability is patched. If immediate upgrade is not feasible, organizations should implement network-level controls to restrict access to the jsx and sx endpoints, such as firewall rules or web application firewall (WAF) policies that block suspicious URL patterns containing relative path traversal sequences (e.g., ../). Additionally, disabling or restricting access to the vulnerable endpoints for non-administrative users can reduce exposure. Regularly auditing web server logs for suspicious requests targeting resource parameters with traversal patterns can help detect attempted exploitation. Organizations should also review and harden file system permissions to limit the impact of any unauthorized file access. Finally, monitoring for any unusual activity or indicators of compromise related to XWiki instances is recommended to enable rapid incident response.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-55748: CWE-23: Relative Path Traversal in xwiki xwiki-platform
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 4.2-milestone-2 through 16.10.6, configuration files are accessible through jsx and sx endpoints. It's possible to access and read configuration files by using URLs such as `http://localhost:8080/bin/ssx/Main/WebHome?resource=../../WEB-INF/xwiki.cfg&minify=false`. This is fixed in version 16.10.7.
AI-Powered Analysis
Technical Analysis
CVE-2025-55748 is a critical security vulnerability identified in the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability is classified as a Relative Path Traversal (CWE-23) and affects versions from 4.2-milestone-2 up to, but not including, 16.10.7. The issue arises because configuration files are accessible through the jsx and sx endpoints without proper validation or sanitization of user-supplied input. An attacker can exploit this by crafting a URL that includes relative path sequences (e.g., ../../) to traverse directories and access sensitive configuration files such as xwiki.cfg. For example, a URL like http://localhost:8080/bin/ssx/Main/WebHome?resource=../../WEB-INF/xwiki.cfg&minify=false allows unauthorized reading of configuration files. These configuration files may contain sensitive information including credentials, system settings, or other confidential data. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely over the network. The CVSS 4.0 base score is 9.3 (critical), reflecting the high impact on confidentiality, integrity, and availability, as well as the ease of exploitation. The vulnerability has been fixed in version 16.10.7 of the XWiki Platform. No known exploits are reported in the wild yet, but the critical nature and straightforward exploitation method make it a significant threat to organizations running vulnerable versions of XWiki.
Potential Impact
For European organizations using the XWiki Platform within the affected version range, this vulnerability poses a severe risk. Unauthorized access to configuration files can lead to exposure of sensitive information such as database credentials, API keys, or internal system configurations. This can facilitate further attacks including privilege escalation, data breaches, or disruption of services. Given that XWiki is often used for internal documentation and collaboration, compromise could also lead to leakage of intellectual property or sensitive corporate information. The lack of authentication requirement and remote exploitability means attackers can target exposed XWiki instances over the internet, increasing the risk of widespread exploitation. Additionally, organizations in regulated sectors such as finance, healthcare, or government may face compliance violations and reputational damage if sensitive data is exposed. The vulnerability could also be leveraged to undermine the integrity and availability of the platform, potentially disrupting business operations.
Mitigation Recommendations
European organizations should immediately assess their XWiki Platform deployments to identify affected versions (>=4.2-milestone-2 and <16.10.7). The primary mitigation is to upgrade to version 16.10.7 or later, where the vulnerability is patched. If immediate upgrade is not feasible, organizations should implement network-level controls to restrict access to the jsx and sx endpoints, such as firewall rules or web application firewall (WAF) policies that block suspicious URL patterns containing relative path traversal sequences (e.g., ../). Additionally, disabling or restricting access to the vulnerable endpoints for non-administrative users can reduce exposure. Regularly auditing web server logs for suspicious requests targeting resource parameters with traversal patterns can help detect attempted exploitation. Organizations should also review and harden file system permissions to limit the impact of any unauthorized file access. Finally, monitoring for any unusual activity or indicators of compromise related to XWiki instances is recommended to enable rapid incident response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-14T22:31:17.685Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b8a5f1ad5a09ad00fa300e
Added to database: 9/3/2025, 8:32:49 PM
Last enriched: 9/3/2025, 8:48:04 PM
Last updated: 10/20/2025, 6:59:10 AM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62577: Incorrect default permissions in Fsas Technologies Inc. ETERNUS SF AdvancedCopy Manager Standard Edition (for Solaris 10/ 11)
HighCVE-2025-11948: CWE-434 Unrestricted Upload of File with Dangerous Type in Excellent Infotek Document Management System
CriticalCVE-2025-11947: Heap-based Buffer Overflow in bftpd
LowCVE-2025-11946: Cross Site Scripting in LogicalDOC Community Edition
MediumCVE-2025-11945: Cross Site Scripting in toeverything AFFiNE
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.