CVE-2025-59954: CWE-94: Improper Control of Generation of Code ('Code Injection') in KnowageLabs Knowage-Server
Knowage is an open source analytics and business intelligence suite. Versions 8.1.26 and below are vulnerable to Remote Code Exection through using an unsafe org.apache.commons.jxpath.JXPathContext in MetaService.java service. This issue is fixed in version 8.1.27.
AI Analysis
Technical Summary
CVE-2025-59954 is a critical remote code execution (RCE) vulnerability affecting KnowageLabs' Knowage-Server, an open source analytics and business intelligence platform. The vulnerability exists in versions prior to 8.1.27 due to improper control over code generation within the MetaService.java component, specifically involving the unsafe use of the org.apache.commons.jxpath.JXPathContext library. This improper handling allows an attacker to inject and execute arbitrary code remotely without any authentication or user interaction. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code), indicating that the application fails to properly sanitize or validate input that is used to generate executable code. The CVSS 4.0 base score of 9.3 reflects the critical nature of this flaw, with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and the severity of impact make this a significant threat. The issue is resolved in Knowage-Server version 8.1.27, which addresses the unsafe usage of JXPathContext to prevent code injection attacks.
Potential Impact
For European organizations using Knowage-Server versions below 8.1.27, this vulnerability poses a severe risk. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands, access sensitive business intelligence data, manipulate analytics results, and disrupt critical reporting functions. This can result in data breaches, loss of data integrity, operational downtime, and potential regulatory non-compliance under GDPR due to unauthorized data access or alteration. Given Knowage's role in data analytics and decision-making, such an attack could undermine business operations and strategic decisions. The lack of required authentication and user interaction means attackers can exploit this vulnerability remotely and stealthily, increasing the risk of widespread impact within affected networks. Additionally, the high confidentiality and integrity impacts elevate the threat to organizations handling sensitive or regulated data.
Mitigation Recommendations
European organizations should immediately verify their Knowage-Server version and upgrade to version 8.1.27 or later, where the vulnerability is patched. If immediate upgrade is not feasible, organizations should implement network-level protections such as restricting access to the Knowage-Server to trusted internal networks and applying strict firewall rules to limit exposure. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious JXPathContext payloads can provide temporary mitigation. Conduct thorough input validation and sanitization on any user-supplied data interacting with the analytics platform. Regularly monitor server logs for unusual activity indicative of code injection attempts. Additionally, organizations should review and harden server configurations, disable unnecessary services, and ensure principle of least privilege is applied to the Knowage-Server process to limit potential damage from exploitation. Finally, maintain an incident response plan tailored to handle potential RCE incidents involving business intelligence platforms.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-59954: CWE-94: Improper Control of Generation of Code ('Code Injection') in KnowageLabs Knowage-Server
Description
Knowage is an open source analytics and business intelligence suite. Versions 8.1.26 and below are vulnerable to Remote Code Exection through using an unsafe org.apache.commons.jxpath.JXPathContext in MetaService.java service. This issue is fixed in version 8.1.27.
AI-Powered Analysis
Technical Analysis
CVE-2025-59954 is a critical remote code execution (RCE) vulnerability affecting KnowageLabs' Knowage-Server, an open source analytics and business intelligence platform. The vulnerability exists in versions prior to 8.1.27 due to improper control over code generation within the MetaService.java component, specifically involving the unsafe use of the org.apache.commons.jxpath.JXPathContext library. This improper handling allows an attacker to inject and execute arbitrary code remotely without any authentication or user interaction. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code), indicating that the application fails to properly sanitize or validate input that is used to generate executable code. The CVSS 4.0 base score of 9.3 reflects the critical nature of this flaw, with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and the severity of impact make this a significant threat. The issue is resolved in Knowage-Server version 8.1.27, which addresses the unsafe usage of JXPathContext to prevent code injection attacks.
Potential Impact
For European organizations using Knowage-Server versions below 8.1.27, this vulnerability poses a severe risk. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands, access sensitive business intelligence data, manipulate analytics results, and disrupt critical reporting functions. This can result in data breaches, loss of data integrity, operational downtime, and potential regulatory non-compliance under GDPR due to unauthorized data access or alteration. Given Knowage's role in data analytics and decision-making, such an attack could undermine business operations and strategic decisions. The lack of required authentication and user interaction means attackers can exploit this vulnerability remotely and stealthily, increasing the risk of widespread impact within affected networks. Additionally, the high confidentiality and integrity impacts elevate the threat to organizations handling sensitive or regulated data.
Mitigation Recommendations
European organizations should immediately verify their Knowage-Server version and upgrade to version 8.1.27 or later, where the vulnerability is patched. If immediate upgrade is not feasible, organizations should implement network-level protections such as restricting access to the Knowage-Server to trusted internal networks and applying strict firewall rules to limit exposure. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious JXPathContext payloads can provide temporary mitigation. Conduct thorough input validation and sanitization on any user-supplied data interacting with the analytics platform. Regularly monitor server logs for unusual activity indicative of code injection attempts. Additionally, organizations should review and harden server configurations, disable unnecessary services, and ensure principle of least privilege is applied to the Knowage-Server process to limit potential damage from exploitation. Finally, maintain an incident response plan tailored to handle potential RCE incidents involving business intelligence platforms.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-23T14:33:49.506Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68db1ba69eb02b06e7e4affc
Added to database: 9/29/2025, 11:52:06 PM
Last enriched: 9/29/2025, 11:52:34 PM
Last updated: 9/30/2025, 4:24:24 AM
Views: 15
Related Threats
CVE-2025-11163: CWE-284 Improper Access Control in wpmudev SmartCrawl SEO checker, analyzer & optimizer
MediumCVE-2025-7052: CWE-352 Cross-Site Request Forgery (CSRF) in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events
HighCVE-2025-7038: CWE-288 Authentication Bypass Using an Alternate Path or Channel in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events
HighCVE-2025-6941: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events
MediumCVE-2025-6815: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.