Skip to main content

CVE-2025-58365: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki-contrib application-blog

High
VulnerabilityCVE-2025-58365cvecve-2025-58365cwe-95
Published: Mon Sep 08 2025 (09/08/2025, 21:19:09 UTC)
Source: CVE Database V5
Vendor/Project: xwiki-contrib
Product: application-blog

Description

The XWiki blog application allows users of the XWiki platform to create and manage blog posts. Prior to version 9.14, the blog application in XWiki allowed remote code execution for any user who has edit right on any page. Normally, these are all logged-in users as they can edit their own user profile. For an exploit, it is sufficient to add an object of type `Blog.BlogPostClass` to any page and to add some script macro with the exploit code to the "Content" field of that object. The vulnerability has been patched in the blog application version 9.14 by executing the content of blog posts with the rights of the appropriate author. No known workarounds are available.

AI-Powered Analysis

AILast updated: 09/08/2025, 21:46:27 UTC

Technical Analysis

CVE-2025-58365 is a high-severity vulnerability affecting the XWiki blog application (xwiki-contrib application-blog) versions prior to 9.14. The vulnerability is classified under CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code, commonly known as 'Eval Injection'. This flaw allows any user with edit rights on any page within the XWiki platform to execute arbitrary code remotely. Since typical users can edit their own user profiles, this effectively means any authenticated user can exploit the vulnerability. The exploit involves adding an object of type `Blog.BlogPostClass` to any page and inserting malicious script code into the "Content" field of that object. The vulnerable versions execute this content without proper authorization context, enabling remote code execution (RCE) with the privileges of the user who authored the blog post content. The vulnerability was patched in version 9.14 by ensuring that blog post content is executed with the rights of the appropriate author, mitigating unauthorized code execution. No known workarounds exist, and no exploits have been observed in the wild as of the publication date. The CVSS 4.0 base score is 8.7, reflecting the network attack vector, low attack complexity, no required authentication beyond edit rights (which are common), and high impact on confidentiality, integrity, and availability. This vulnerability is critical because it allows attackers to execute arbitrary code remotely, potentially leading to full system compromise or lateral movement within affected environments.

Potential Impact

For European organizations using the XWiki platform with the vulnerable blog application version prior to 9.14, this vulnerability poses a significant risk. Attackers with minimal privileges (edit rights, which are commonly granted to authenticated users) can execute arbitrary code remotely, potentially leading to data breaches, unauthorized access, and disruption of services. Given that XWiki is often used for internal collaboration, knowledge management, and documentation, exploitation could lead to exposure of sensitive corporate information, intellectual property, or personal data protected under GDPR. The ability to execute code remotely also raises the risk of deploying malware, ransomware, or establishing persistent backdoors within organizational networks. This could disrupt business operations, damage reputation, and result in regulatory penalties. The lack of known workarounds means organizations must prioritize patching. The vulnerability's exploitation does not require user interaction beyond having edit rights, increasing the attack surface. European entities relying on XWiki for critical internal functions are particularly at risk, especially if they have not upgraded to the patched version or implemented compensating controls.

Mitigation Recommendations

The primary and most effective mitigation is to upgrade the XWiki blog application to version 9.14 or later, where the vulnerability has been patched by executing blog post content with the correct author rights. Organizations should immediately inventory their XWiki deployments to identify affected versions. If immediate patching is not feasible, organizations should restrict edit rights to trusted users only, minimizing the number of users who can add or modify blog post content. Implementing strict access controls and monitoring for unusual editing activity can help detect potential exploitation attempts. Additionally, applying web application firewalls (WAFs) with custom rules to detect and block suspicious script macro insertions may provide temporary protection. Regularly auditing user permissions and ensuring that only necessary users have edit rights reduces risk. Finally, organizations should monitor logs for any signs of exploitation attempts and prepare incident response plans to quickly address any compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-29T16:19:59.011Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bf4b2cd5a2966cfc836cf9

Added to database: 9/8/2025, 9:31:24 PM

Last enriched: 9/8/2025, 9:46:27 PM

Last updated: 9/10/2025, 3:10:20 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats