Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65036: CWE-862: Missing Authorization in xwikisas xwiki-pro-macros

0
High
VulnerabilityCVE-2025-65036cvecve-2025-65036cwe-862
Published: Fri Dec 05 2025 (12/05/2025, 16:10:08 UTC)
Source: CVE Database V5
Vendor/Project: xwikisas
Product: xwiki-pro-macros

Description

XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Prior to 1.27.1, the macro executes Velocity from the details pages without checking for permissions, which can lead to remote code execution. This vulnerability is fixed in 1.27.1.

AI-Powered Analysis

AILast updated: 12/05/2025, 16:45:37 UTC

Technical Analysis

The vulnerability identified as CVE-2025-65036 affects the xwikisas xwiki-pro-macros product, specifically versions prior to 1.27.1. The issue stems from a missing authorization check (CWE-862) in the Remote Macros feature, which is designed to facilitate content migration from Confluence by executing Velocity scripts within XWiki detail pages. Due to the lack of permission verification, users with limited privileges can execute arbitrary Velocity code remotely. This can lead to remote code execution (RCE), allowing attackers to compromise the confidentiality, integrity, and availability of the affected systems. The vulnerability is exploitable over the network (AV:N), requires low privileges (PR:L), does not require user interaction (UI:N), and affects the system's confidentiality and integrity to a high degree, with a slight impact on availability, as reflected by the CVSS 3.1 score of 8.3. The flaw was publicly disclosed on December 5, 2025, and fixed in version 1.27.1 of xwiki-pro-macros. No known exploits have been reported in the wild yet, but the nature of the vulnerability makes it a critical risk for organizations using vulnerable versions. The vulnerability's exploitation could allow attackers to execute arbitrary code, potentially leading to data breaches, system compromise, and lateral movement within networks.

Potential Impact

For European organizations, the impact of CVE-2025-65036 can be severe, especially for those relying on XWiki for collaborative documentation, knowledge management, and content migration from Confluence. Successful exploitation could lead to unauthorized remote code execution, enabling attackers to access sensitive data, modify or delete content, and disrupt business operations. This could result in data breaches, intellectual property theft, and reputational damage. Organizations in regulated industries such as finance, healthcare, and government sectors face additional compliance risks due to potential violations of GDPR and other data protection laws. The vulnerability's ease of exploitation and network accessibility increase the likelihood of targeted attacks or opportunistic exploitation by cybercriminals. Additionally, compromised systems could serve as footholds for further attacks within the organization's network, amplifying the overall risk.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade xwiki-pro-macros to version 1.27.1 or later, where the missing authorization check has been implemented. Until the upgrade is applied, restrict access to XWiki instances to trusted users only and limit macro execution permissions to highly trusted administrators. Conduct an audit of existing macros and Velocity scripts to identify and disable any potentially unsafe or unnecessary macros. Implement network segmentation and firewall rules to limit external access to XWiki servers. Monitor logs for unusual macro execution patterns or unauthorized access attempts. Employ application-layer security controls such as Web Application Firewalls (WAFs) with custom rules to detect and block suspicious Velocity script execution. Finally, educate administrators and developers about secure macro usage and the risks of executing untrusted code within XWiki environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-13T15:36:51.684Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693308e8f88dbe026cf79160

Added to database: 12/5/2025, 4:31:36 PM

Last enriched: 12/5/2025, 4:45:37 PM

Last updated: 12/6/2025, 4:23:03 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats