CVE-2025-65089: CWE-862: Missing Authorization in xwikisas xwiki-pro-macros
CVE-2025-65089 is a medium severity vulnerability in xwikisas xwiki-pro-macros prior to version 1. 27. 0. It involves missing authorization checks in the Remote Macros feature, allowing users without view rights on a page to access the content of office attachments via the view file macro. This vulnerability impacts confidentiality but does not affect integrity or availability. Exploitation requires low privileges (limited user rights) and some user interaction, but no authentication bypass is involved. The issue has been patched in version 1. 27. 0. European organizations using affected versions of xwiki-pro-macros should prioritize upgrading to mitigate unauthorized data exposure risks.
AI Analysis
Technical Summary
CVE-2025-65089 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the xwikisas xwiki-pro-macros product, specifically versions prior to 1.27.0. The vulnerability arises from insufficient authorization checks in the Remote Macros component, which provides rendering macros to facilitate content migration from Confluence. The flaw allows a user who lacks view permissions on a page to nonetheless access the content of office attachments embedded or referenced via the 'view file' macro. This results in unauthorized disclosure of potentially sensitive document contents. The vulnerability does not permit modification or deletion of data, nor does it impact system availability. The CVSS v3.1 base score is 6.8, reflecting a medium severity with the vector AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N, indicating network attack vector, low attack complexity, requiring privileges but with user interaction, and a scope change with high confidentiality impact. The issue was publicly disclosed on November 19, 2025, and has been addressed in xwiki-pro-macros version 1.27.0. No public exploits have been reported to date. The vulnerability is significant in environments where sensitive office documents are stored and rendered via XWiki macros, as unauthorized users could gain access to confidential information without proper permissions.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive or confidential information contained within office attachments managed by XWiki platforms using the vulnerable macros. This can lead to data breaches, non-compliance with GDPR and other data protection regulations, and potential reputational damage. Sectors such as government, education, healthcare, and enterprises that rely on XWiki for document collaboration and content management are particularly at risk. The confidentiality impact is high, but since integrity and availability are unaffected, the threat is primarily data exposure. Attackers with limited user privileges could exploit this vulnerability remotely with some user interaction, increasing the risk in multi-tenant or collaborative environments. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for prompt remediation.
Mitigation Recommendations
European organizations should immediately upgrade xwiki-pro-macros to version 1.27.0 or later to remediate this vulnerability. Until patching is complete, organizations should restrict access to XWiki instances to trusted users only and review user permissions to minimize exposure. Implement network segmentation and access controls to limit external access to XWiki services. Monitor logs for unusual access patterns to office attachments or macro usage. Conduct an audit of sensitive documents accessible via macros and consider temporarily disabling the Remote Macros feature if feasible. Additionally, educate users about the risk of interacting with untrusted content that could trigger macro rendering. Regularly review and update security policies related to collaboration platforms and ensure timely application of security patches.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-65089: CWE-862: Missing Authorization in xwikisas xwiki-pro-macros
Description
CVE-2025-65089 is a medium severity vulnerability in xwikisas xwiki-pro-macros prior to version 1. 27. 0. It involves missing authorization checks in the Remote Macros feature, allowing users without view rights on a page to access the content of office attachments via the view file macro. This vulnerability impacts confidentiality but does not affect integrity or availability. Exploitation requires low privileges (limited user rights) and some user interaction, but no authentication bypass is involved. The issue has been patched in version 1. 27. 0. European organizations using affected versions of xwiki-pro-macros should prioritize upgrading to mitigate unauthorized data exposure risks.
AI-Powered Analysis
Technical Analysis
CVE-2025-65089 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the xwikisas xwiki-pro-macros product, specifically versions prior to 1.27.0. The vulnerability arises from insufficient authorization checks in the Remote Macros component, which provides rendering macros to facilitate content migration from Confluence. The flaw allows a user who lacks view permissions on a page to nonetheless access the content of office attachments embedded or referenced via the 'view file' macro. This results in unauthorized disclosure of potentially sensitive document contents. The vulnerability does not permit modification or deletion of data, nor does it impact system availability. The CVSS v3.1 base score is 6.8, reflecting a medium severity with the vector AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N, indicating network attack vector, low attack complexity, requiring privileges but with user interaction, and a scope change with high confidentiality impact. The issue was publicly disclosed on November 19, 2025, and has been addressed in xwiki-pro-macros version 1.27.0. No public exploits have been reported to date. The vulnerability is significant in environments where sensitive office documents are stored and rendered via XWiki macros, as unauthorized users could gain access to confidential information without proper permissions.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive or confidential information contained within office attachments managed by XWiki platforms using the vulnerable macros. This can lead to data breaches, non-compliance with GDPR and other data protection regulations, and potential reputational damage. Sectors such as government, education, healthcare, and enterprises that rely on XWiki for document collaboration and content management are particularly at risk. The confidentiality impact is high, but since integrity and availability are unaffected, the threat is primarily data exposure. Attackers with limited user privileges could exploit this vulnerability remotely with some user interaction, increasing the risk in multi-tenant or collaborative environments. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for prompt remediation.
Mitigation Recommendations
European organizations should immediately upgrade xwiki-pro-macros to version 1.27.0 or later to remediate this vulnerability. Until patching is complete, organizations should restrict access to XWiki instances to trusted users only and review user permissions to minimize exposure. Implement network segmentation and access controls to limit external access to XWiki services. Monitor logs for unusual access patterns to office attachments or macro usage. Conduct an audit of sensitive documents accessible via macros and consider temporarily disabling the Remote Macros feature if feasible. Additionally, educate users about the risk of interacting with untrusted content that could trigger macro rendering. Regularly review and update security policies related to collaboration platforms and ensure timely application of security patches.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-17T20:55:34.690Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691e09e0e0559f57045745bd
Added to database: 11/19/2025, 6:18:08 PM
Last enriched: 11/26/2025, 7:00:46 PM
Last updated: 1/7/2026, 8:46:24 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.