Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59954: CWE-94: Improper Control of Generation of Code ('Code Injection') in KnowageLabs Knowage-Server

0
Critical
VulnerabilityCVE-2025-59954cvecve-2025-59954cwe-94
Published: Mon Sep 29 2025 (09/29/2025, 23:48:04 UTC)
Source: CVE Database V5
Vendor/Project: KnowageLabs
Product: Knowage-Server

Description

Knowage is an open source analytics and business intelligence suite. Versions 8.1.26 and below are vulnerable to Remote Code Exection through using an unsafe org.apache.commons.jxpath.JXPathContext in MetaService.java service. This issue is fixed in version 8.1.27.

AI-Powered Analysis

AILast updated: 10/07/2025, 00:50:52 UTC

Technical Analysis

CVE-2025-59954 is a critical security vulnerability classified under CWE-94 (Improper Control of Generation of Code, or Code Injection) affecting KnowageLabs' Knowage-Server, an open-source analytics and business intelligence suite. Versions 8.1.26 and earlier are vulnerable due to unsafe handling of the org.apache.commons.jxpath.JXPathContext within the MetaService.java service. This unsafe usage allows an attacker to craft malicious input that leads to remote code execution (RCE) without requiring authentication or user interaction. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, as the attacker can execute arbitrary code, potentially leading to full system compromise. The vulnerability was published on September 29, 2025, and fixed in version 8.1.27 of Knowage-Server. Although no known exploits have been reported in the wild yet, the critical CVSS score of 9.3 reflects the severity and ease of exploitation. The vulnerability stems from improper input validation and unsafe code generation practices in the affected service component, highlighting the importance of secure coding and input sanitization in software development. Organizations using vulnerable versions should prioritize patching and consider additional security controls to mitigate risk while upgrading.

Potential Impact

The impact of CVE-2025-59954 on European organizations can be severe, particularly for those relying on Knowage-Server for business intelligence and analytics. Successful exploitation allows remote attackers to execute arbitrary code on affected servers, potentially leading to data breaches, unauthorized access to sensitive business data, disruption of analytics services, and lateral movement within corporate networks. This can compromise confidentiality, integrity, and availability of critical business information and systems. Given the criticality and ease of exploitation, attackers could deploy ransomware, steal intellectual property, or disrupt operations. The impact is heightened in sectors with stringent data protection requirements such as finance, healthcare, and government. Additionally, the open-source nature of Knowage-Server means many organizations may be unaware of the vulnerability or delay patching, increasing exposure. European organizations with complex IT environments and integration of BI tools into decision-making workflows face operational risks and potential regulatory consequences if exploited.

Mitigation Recommendations

To mitigate CVE-2025-59954, organizations should immediately upgrade Knowage-Server to version 8.1.27 or later, where the vulnerability is fixed. If immediate upgrade is not feasible, restrict network access to the Knowage-Server instance using firewalls or network segmentation to limit exposure to trusted users only. Implement strict input validation and sanitization on any user-supplied data interacting with the MetaService or related components. Monitor logs and network traffic for unusual activity indicative of exploitation attempts, such as unexpected process executions or anomalous API calls. Employ application-layer firewalls or runtime application self-protection (RASP) tools to detect and block code injection attempts. Conduct thorough security audits and penetration tests focusing on the Knowage environment. Educate development and operations teams on secure coding practices to prevent similar issues. Finally, maintain an incident response plan tailored to potential exploitation scenarios involving BI platforms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-23T14:33:49.506Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68db1ba69eb02b06e7e4affc

Added to database: 9/29/2025, 11:52:06 PM

Last enriched: 10/7/2025, 12:50:52 AM

Last updated: 11/15/2025, 1:55:23 AM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats