Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58365: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki-contrib application-blog

0
High
VulnerabilityCVE-2025-58365cvecve-2025-58365cwe-95
Published: Mon Sep 08 2025 (09/08/2025, 21:19:09 UTC)
Source: CVE Database V5
Vendor/Project: xwiki-contrib
Product: application-blog

Description

The XWiki blog application allows users of the XWiki platform to create and manage blog posts. Prior to version 9.14, the blog application in XWiki allowed remote code execution for any user who has edit right on any page. Normally, these are all logged-in users as they can edit their own user profile. For an exploit, it is sufficient to add an object of type `Blog.BlogPostClass` to any page and to add some script macro with the exploit code to the "Content" field of that object. The vulnerability has been patched in the blog application version 9.14 by executing the content of blog posts with the rights of the appropriate author. No known workarounds are available.

AI-Powered Analysis

AILast updated: 09/16/2025, 01:04:35 UTC

Technical Analysis

CVE-2025-58365 is a high-severity vulnerability classified under CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code, also known as Eval Injection) affecting the XWiki platform's blog application (xwiki-contrib application-blog) versions prior to 9.14. The vulnerability allows remote code execution (RCE) by any user with edit rights on any page within the XWiki platform. Since typical users can edit their own user profile pages, this effectively means any authenticated user can exploit this flaw. The exploit involves adding an object of type `Blog.BlogPostClass` to any page and inserting malicious script code within the "Content" field of that object using a script macro. This malicious code is then executed with elevated privileges, enabling the attacker to run arbitrary code on the server hosting the XWiki instance. The vulnerability arises because the blog application executes the content of blog posts without properly neutralizing or sandboxing dynamically evaluated code, allowing injection of directives that lead to code execution. The issue was patched in version 9.14 by changing the execution context so that blog post content is executed with the rights of the appropriate author, preventing unauthorized code execution. No known workarounds exist, making patching the only effective remediation. The CVSS 4.0 base score is 8.7, reflecting the network attack vector, low attack complexity, no required authentication beyond edit rights (which are common), and high impact on confidentiality, integrity, and availability. There are no known exploits in the wild at the time of publication, but the vulnerability's nature and ease of exploitation make it a critical risk for affected deployments.

Potential Impact

For European organizations using XWiki with the vulnerable blog application versions prior to 9.14, this vulnerability poses a significant risk. An attacker with minimal privileges (any authenticated user with edit rights) can execute arbitrary code on the server, potentially leading to full system compromise. This could result in data theft, unauthorized data modification, service disruption, or use of the compromised server as a pivot point for further attacks within the organization's network. Given that XWiki is often used for internal collaboration, documentation, and knowledge management, sensitive corporate or personal data could be exposed or manipulated. The vulnerability's exploitation could also undermine trust in internal systems and lead to regulatory compliance issues under GDPR if personal data is compromised. The lack of known workarounds means organizations must prioritize patching to mitigate risk. Additionally, the vulnerability could be leveraged for lateral movement or persistence by advanced threat actors targeting European enterprises, especially those in sectors relying on XWiki for critical business functions.

Mitigation Recommendations

The primary and only effective mitigation is to upgrade the xwiki-contrib application-blog to version 9.14 or later, where the vulnerability is patched by restricting code execution privileges appropriately. Organizations should: 1) Inventory all XWiki deployments and identify versions of the blog application in use. 2) Immediately plan and execute upgrades to version 9.14 or newer. 3) Restrict edit rights on pages to trusted users only as a temporary risk reduction measure until patching is complete. 4) Monitor logs for unusual editing activity or script macro insertions in blog posts. 5) Implement network segmentation and least privilege principles to limit the impact of any potential compromise. 6) Conduct security awareness training for users about the risks of injecting untrusted content. 7) Consider deploying runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious script macro usage if patching is delayed. These steps go beyond generic advice by focusing on immediate risk reduction and detection until patching is fully deployed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-29T16:19:59.011Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bf4b2cd5a2966cfc836cf9

Added to database: 9/8/2025, 9:31:24 PM

Last enriched: 9/16/2025, 1:04:35 AM

Last updated: 10/29/2025, 9:50:23 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats