CVE-2025-58365: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki-contrib application-blog
The XWiki blog application allows users of the XWiki platform to create and manage blog posts. Prior to version 9.14, the blog application in XWiki allowed remote code execution for any user who has edit right on any page. Normally, these are all logged-in users as they can edit their own user profile. For an exploit, it is sufficient to add an object of type `Blog.BlogPostClass` to any page and to add some script macro with the exploit code to the "Content" field of that object. The vulnerability has been patched in the blog application version 9.14 by executing the content of blog posts with the rights of the appropriate author. No known workarounds are available.
AI Analysis
Technical Summary
CVE-2025-58365 is a high-severity vulnerability classified under CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code, also known as Eval Injection) affecting the XWiki platform's blog application (xwiki-contrib application-blog) versions prior to 9.14. The vulnerability allows remote code execution (RCE) by any user with edit rights on any page within the XWiki platform. Since typical users can edit their own user profile pages, this effectively means any authenticated user can exploit this flaw. The exploit involves adding an object of type `Blog.BlogPostClass` to any page and inserting malicious script code within the "Content" field of that object using a script macro. This malicious code is then executed with elevated privileges, enabling the attacker to run arbitrary code on the server hosting the XWiki instance. The vulnerability arises because the blog application executes the content of blog posts without properly neutralizing or sandboxing dynamically evaluated code, allowing injection of directives that lead to code execution. The issue was patched in version 9.14 by changing the execution context so that blog post content is executed with the rights of the appropriate author, preventing unauthorized code execution. No known workarounds exist, making patching the only effective remediation. The CVSS 4.0 base score is 8.7, reflecting the network attack vector, low attack complexity, no required authentication beyond edit rights (which are common), and high impact on confidentiality, integrity, and availability. There are no known exploits in the wild at the time of publication, but the vulnerability's nature and ease of exploitation make it a critical risk for affected deployments.
Potential Impact
For European organizations using XWiki with the vulnerable blog application versions prior to 9.14, this vulnerability poses a significant risk. An attacker with minimal privileges (any authenticated user with edit rights) can execute arbitrary code on the server, potentially leading to full system compromise. This could result in data theft, unauthorized data modification, service disruption, or use of the compromised server as a pivot point for further attacks within the organization's network. Given that XWiki is often used for internal collaboration, documentation, and knowledge management, sensitive corporate or personal data could be exposed or manipulated. The vulnerability's exploitation could also undermine trust in internal systems and lead to regulatory compliance issues under GDPR if personal data is compromised. The lack of known workarounds means organizations must prioritize patching to mitigate risk. Additionally, the vulnerability could be leveraged for lateral movement or persistence by advanced threat actors targeting European enterprises, especially those in sectors relying on XWiki for critical business functions.
Mitigation Recommendations
The primary and only effective mitigation is to upgrade the xwiki-contrib application-blog to version 9.14 or later, where the vulnerability is patched by restricting code execution privileges appropriately. Organizations should: 1) Inventory all XWiki deployments and identify versions of the blog application in use. 2) Immediately plan and execute upgrades to version 9.14 or newer. 3) Restrict edit rights on pages to trusted users only as a temporary risk reduction measure until patching is complete. 4) Monitor logs for unusual editing activity or script macro insertions in blog posts. 5) Implement network segmentation and least privilege principles to limit the impact of any potential compromise. 6) Conduct security awareness training for users about the risks of injecting untrusted content. 7) Consider deploying runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious script macro usage if patching is delayed. These steps go beyond generic advice by focusing on immediate risk reduction and detection until patching is fully deployed.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-58365: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki-contrib application-blog
Description
The XWiki blog application allows users of the XWiki platform to create and manage blog posts. Prior to version 9.14, the blog application in XWiki allowed remote code execution for any user who has edit right on any page. Normally, these are all logged-in users as they can edit their own user profile. For an exploit, it is sufficient to add an object of type `Blog.BlogPostClass` to any page and to add some script macro with the exploit code to the "Content" field of that object. The vulnerability has been patched in the blog application version 9.14 by executing the content of blog posts with the rights of the appropriate author. No known workarounds are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-58365 is a high-severity vulnerability classified under CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code, also known as Eval Injection) affecting the XWiki platform's blog application (xwiki-contrib application-blog) versions prior to 9.14. The vulnerability allows remote code execution (RCE) by any user with edit rights on any page within the XWiki platform. Since typical users can edit their own user profile pages, this effectively means any authenticated user can exploit this flaw. The exploit involves adding an object of type `Blog.BlogPostClass` to any page and inserting malicious script code within the "Content" field of that object using a script macro. This malicious code is then executed with elevated privileges, enabling the attacker to run arbitrary code on the server hosting the XWiki instance. The vulnerability arises because the blog application executes the content of blog posts without properly neutralizing or sandboxing dynamically evaluated code, allowing injection of directives that lead to code execution. The issue was patched in version 9.14 by changing the execution context so that blog post content is executed with the rights of the appropriate author, preventing unauthorized code execution. No known workarounds exist, making patching the only effective remediation. The CVSS 4.0 base score is 8.7, reflecting the network attack vector, low attack complexity, no required authentication beyond edit rights (which are common), and high impact on confidentiality, integrity, and availability. There are no known exploits in the wild at the time of publication, but the vulnerability's nature and ease of exploitation make it a critical risk for affected deployments.
Potential Impact
For European organizations using XWiki with the vulnerable blog application versions prior to 9.14, this vulnerability poses a significant risk. An attacker with minimal privileges (any authenticated user with edit rights) can execute arbitrary code on the server, potentially leading to full system compromise. This could result in data theft, unauthorized data modification, service disruption, or use of the compromised server as a pivot point for further attacks within the organization's network. Given that XWiki is often used for internal collaboration, documentation, and knowledge management, sensitive corporate or personal data could be exposed or manipulated. The vulnerability's exploitation could also undermine trust in internal systems and lead to regulatory compliance issues under GDPR if personal data is compromised. The lack of known workarounds means organizations must prioritize patching to mitigate risk. Additionally, the vulnerability could be leveraged for lateral movement or persistence by advanced threat actors targeting European enterprises, especially those in sectors relying on XWiki for critical business functions.
Mitigation Recommendations
The primary and only effective mitigation is to upgrade the xwiki-contrib application-blog to version 9.14 or later, where the vulnerability is patched by restricting code execution privileges appropriately. Organizations should: 1) Inventory all XWiki deployments and identify versions of the blog application in use. 2) Immediately plan and execute upgrades to version 9.14 or newer. 3) Restrict edit rights on pages to trusted users only as a temporary risk reduction measure until patching is complete. 4) Monitor logs for unusual editing activity or script macro insertions in blog posts. 5) Implement network segmentation and least privilege principles to limit the impact of any potential compromise. 6) Conduct security awareness training for users about the risks of injecting untrusted content. 7) Consider deploying runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious script macro usage if patching is delayed. These steps go beyond generic advice by focusing on immediate risk reduction and detection until patching is fully deployed.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-29T16:19:59.011Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68bf4b2cd5a2966cfc836cf9
Added to database: 9/8/2025, 9:31:24 PM
Last enriched: 9/16/2025, 1:04:35 AM
Last updated: 10/29/2025, 9:50:23 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12450: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litespeedtech LiteSpeed Cache
MediumCVE-2025-64291: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce User Roles
UnknownCVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64289: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64286: Cross-Site Request Forgery (CSRF) in WpEstate WP Rentals
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.