Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65089: CWE-862: Missing Authorization in xwikisas xwiki-pro-macros

0
Medium
VulnerabilityCVE-2025-65089cvecve-2025-65089cwe-862
Published: Wed Nov 19 2025 (11/19/2025, 17:41:31 UTC)
Source: CVE Database V5
Vendor/Project: xwikisas
Product: xwiki-pro-macros

Description

CVE-2025-65089 is a medium severity vulnerability in xwikisas xwiki-pro-macros prior to version 1. 27. 0. It involves missing authorization checks in the Remote Macros feature, allowing users without view rights on a page to access the content of office attachments via the view file macro. This vulnerability impacts confidentiality but does not affect integrity or availability. Exploitation requires low privileges (limited user rights) and some user interaction, but no authentication bypass is involved. The issue has been patched in version 1. 27. 0. European organizations using affected versions of xwiki-pro-macros should prioritize upgrading to mitigate unauthorized data exposure risks.

AI-Powered Analysis

AILast updated: 11/26/2025, 19:00:46 UTC

Technical Analysis

CVE-2025-65089 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the xwikisas xwiki-pro-macros product, specifically versions prior to 1.27.0. The vulnerability arises from insufficient authorization checks in the Remote Macros component, which provides rendering macros to facilitate content migration from Confluence. The flaw allows a user who lacks view permissions on a page to nonetheless access the content of office attachments embedded or referenced via the 'view file' macro. This results in unauthorized disclosure of potentially sensitive document contents. The vulnerability does not permit modification or deletion of data, nor does it impact system availability. The CVSS v3.1 base score is 6.8, reflecting a medium severity with the vector AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N, indicating network attack vector, low attack complexity, requiring privileges but with user interaction, and a scope change with high confidentiality impact. The issue was publicly disclosed on November 19, 2025, and has been addressed in xwiki-pro-macros version 1.27.0. No public exploits have been reported to date. The vulnerability is significant in environments where sensitive office documents are stored and rendered via XWiki macros, as unauthorized users could gain access to confidential information without proper permissions.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive or confidential information contained within office attachments managed by XWiki platforms using the vulnerable macros. This can lead to data breaches, non-compliance with GDPR and other data protection regulations, and potential reputational damage. Sectors such as government, education, healthcare, and enterprises that rely on XWiki for document collaboration and content management are particularly at risk. The confidentiality impact is high, but since integrity and availability are unaffected, the threat is primarily data exposure. Attackers with limited user privileges could exploit this vulnerability remotely with some user interaction, increasing the risk in multi-tenant or collaborative environments. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for prompt remediation.

Mitigation Recommendations

European organizations should immediately upgrade xwiki-pro-macros to version 1.27.0 or later to remediate this vulnerability. Until patching is complete, organizations should restrict access to XWiki instances to trusted users only and review user permissions to minimize exposure. Implement network segmentation and access controls to limit external access to XWiki services. Monitor logs for unusual access patterns to office attachments or macro usage. Conduct an audit of sensitive documents accessible via macros and consider temporarily disabling the Remote Macros feature if feasible. Additionally, educate users about the risk of interacting with untrusted content that could trigger macro rendering. Regularly review and update security policies related to collaboration platforms and ensure timely application of security patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-17T20:55:34.690Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691e09e0e0559f57045745bd

Added to database: 11/19/2025, 6:18:08 PM

Last enriched: 11/26/2025, 7:00:46 PM

Last updated: 1/7/2026, 8:46:24 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats