CVE-2025-55749: CWE-284: Improper Access Control in xwiki xwiki-platform
XWiki is an open-source wiki software platform. From 16.7.0 to 16.10.11, 17.4.4, or 17.7.0, in an instance which is using the XWiki Jetty package (XJetty), a context is exposed to statically access any file located in the webapp/ folder. It allows accessing files which might contains credentials. Fixed in 16.10.11, 17.4.4, and 17.7.0.
AI Analysis
Technical Summary
CVE-2025-55749 is an improper access control vulnerability (CWE-284) found in the XWiki platform, specifically in instances deploying the XWiki Jetty package (XJetty). The flaw exists in versions 16.7.0 through 16.10.10, 17.0.0-rc1 through 17.4.3, and 17.5.0 through 17.6.x, where a context is exposed that allows unauthenticated remote attackers to statically access any file located within the webapp/ directory of the deployed XWiki instance. This directory may contain sensitive files, including configuration files or credential stores, which can be read without any authentication or user interaction. The vulnerability arises due to insufficient access control checks on the exposed context, effectively bypassing intended security boundaries. The CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects that the attack can be performed remotely over the network with low complexity, no privileges, and no user interaction, resulting in a high confidentiality impact. While no known exploits have been reported in the wild, the ease of exploitation and potential for credential disclosure make this a critical risk. The issue was addressed by the XWiki development team in versions 16.10.11, 17.4.4, and 17.7.0 by restricting access to the webapp/ folder context and enforcing proper access controls.
Potential Impact
For European organizations, this vulnerability poses a significant risk of unauthorized disclosure of sensitive information, including credentials and configuration files, which could lead to further compromise of internal systems or data breaches. Organizations relying on XWiki for internal documentation, knowledge management, or collaboration may face exposure of confidential business information or user credentials. The lack of authentication requirement means that any attacker with network access to the affected XWiki instance can exploit this vulnerability, increasing the attack surface. This can result in loss of confidentiality, potential lateral movement within networks, and compliance violations under GDPR due to unauthorized data exposure. The impact is particularly critical for sectors with stringent data protection requirements such as finance, healthcare, and government agencies in Europe.
Mitigation Recommendations
European organizations should immediately verify if their XWiki installations are running affected versions (>=16.7.0 and <16.10.11, >=17.0.0-rc1 and <17.4.4, >=17.5.0 and <17.7.0) with the XJetty package. The primary mitigation is to upgrade to patched versions 16.10.11, 17.4.4, or 17.7.0 as soon as possible. If immediate upgrade is not feasible, organizations should restrict network access to the XWiki webapp, especially blocking untrusted external access to the XWiki Jetty service. Implementing web application firewalls (WAFs) with rules to block unauthorized access to the webapp/ directory can provide temporary protection. Additionally, auditing and rotating any credentials or secrets stored within the webapp/ folder is recommended to mitigate potential exposure. Regularly monitoring logs for unusual access patterns targeting the webapp/ folder can help detect exploitation attempts. Finally, organizations should review their XWiki deployment configurations to ensure minimal exposure of sensitive directories.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2025-55749: CWE-284: Improper Access Control in xwiki xwiki-platform
Description
XWiki is an open-source wiki software platform. From 16.7.0 to 16.10.11, 17.4.4, or 17.7.0, in an instance which is using the XWiki Jetty package (XJetty), a context is exposed to statically access any file located in the webapp/ folder. It allows accessing files which might contains credentials. Fixed in 16.10.11, 17.4.4, and 17.7.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-55749 is an improper access control vulnerability (CWE-284) found in the XWiki platform, specifically in instances deploying the XWiki Jetty package (XJetty). The flaw exists in versions 16.7.0 through 16.10.10, 17.0.0-rc1 through 17.4.3, and 17.5.0 through 17.6.x, where a context is exposed that allows unauthenticated remote attackers to statically access any file located within the webapp/ directory of the deployed XWiki instance. This directory may contain sensitive files, including configuration files or credential stores, which can be read without any authentication or user interaction. The vulnerability arises due to insufficient access control checks on the exposed context, effectively bypassing intended security boundaries. The CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects that the attack can be performed remotely over the network with low complexity, no privileges, and no user interaction, resulting in a high confidentiality impact. While no known exploits have been reported in the wild, the ease of exploitation and potential for credential disclosure make this a critical risk. The issue was addressed by the XWiki development team in versions 16.10.11, 17.4.4, and 17.7.0 by restricting access to the webapp/ folder context and enforcing proper access controls.
Potential Impact
For European organizations, this vulnerability poses a significant risk of unauthorized disclosure of sensitive information, including credentials and configuration files, which could lead to further compromise of internal systems or data breaches. Organizations relying on XWiki for internal documentation, knowledge management, or collaboration may face exposure of confidential business information or user credentials. The lack of authentication requirement means that any attacker with network access to the affected XWiki instance can exploit this vulnerability, increasing the attack surface. This can result in loss of confidentiality, potential lateral movement within networks, and compliance violations under GDPR due to unauthorized data exposure. The impact is particularly critical for sectors with stringent data protection requirements such as finance, healthcare, and government agencies in Europe.
Mitigation Recommendations
European organizations should immediately verify if their XWiki installations are running affected versions (>=16.7.0 and <16.10.11, >=17.0.0-rc1 and <17.4.4, >=17.5.0 and <17.7.0) with the XJetty package. The primary mitigation is to upgrade to patched versions 16.10.11, 17.4.4, or 17.7.0 as soon as possible. If immediate upgrade is not feasible, organizations should restrict network access to the XWiki webapp, especially blocking untrusted external access to the XWiki Jetty service. Implementing web application firewalls (WAFs) with rules to block unauthorized access to the webapp/ directory can provide temporary protection. Additionally, auditing and rotating any credentials or secrets stored within the webapp/ folder is recommended to mitigate potential exposure. Regularly monitoring logs for unusual access patterns targeting the webapp/ folder can help detect exploitation attempts. Finally, organizations should review their XWiki deployment configurations to ensure minimal exposure of sensitive directories.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-14T22:31:17.685Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692dfa38821c4e4a8f7fb963
Added to database: 12/1/2025, 8:27:36 PM
Last enriched: 12/1/2025, 8:42:38 PM
Last updated: 12/1/2025, 9:49:25 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66298: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine in getgrav grav
HighCVE-2025-65622: n/a
UnknownCVE-2025-66301: CWE-285: Improper Authorization in getgrav grav
HighCVE-2025-66303: CWE-400: Uncontrolled Resource Consumption in getgrav grav
MediumCVE-2025-66302: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in getgrav grav
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.