Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66473: CWE-770: Allocation of Resources Without Limits or Throttling in xwiki xwiki-platform

0
High
VulnerabilityCVE-2025-66473cvecve-2025-66473cwe-770
Published: Wed Dec 10 2025 (12/10/2025, 21:51:55 UTC)
Source: CVE Database V5
Vendor/Project: xwiki
Product: xwiki-platform

Description

XWiki is an open-source wiki software platform. Versions 16.10.10 and below, 17.0.0-rc-1 through 17.4.3 and 17.5.0-rc-1 through 17.6.0 contain a REST API which doesn't enforce any limits for the number of items that can be requested in a single request at the moment. Depending on the number of pages in the wiki and the memory configuration, this can lead to slowness and unavailability of the wiki. As an example, the /rest/wikis/xwiki/spaces resource returns all spaces on the wiki by default, which are basically all pages. This issue is fixed in versions 17.4.4 and 16.10.11.

AI-Powered Analysis

AILast updated: 12/10/2025, 22:17:03 UTC

Technical Analysis

CVE-2025-66473 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the XWiki open-source wiki platform. The issue exists in the REST API endpoints of affected versions (below 16.10.11, and certain 17.x release candidates before 17.4.4 and 17.7.0-rc-1), where no limits are enforced on the number of items returned in a single API request. For example, the /rest/wikis/xwiki/spaces endpoint returns all spaces (essentially all pages) by default without pagination or throttling. An attacker can exploit this by sending requests that demand large amounts of data, causing excessive memory and CPU consumption on the server. This resource exhaustion can degrade performance severely or cause the wiki service to become unavailable, effectively a denial-of-service (DoS) attack. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score of 8.7 reflects the network attack vector, low complexity, no privileges or user interaction required, and high impact on availability. The vulnerability was publicly disclosed on December 10, 2025, and fixed in versions 16.10.11, 17.4.4, and later. No public exploits have been reported yet, but the nature of the flaw makes it a likely target for DoS attacks in unpatched environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of XWiki-based collaboration platforms, which are commonly used in enterprises, government agencies, and educational institutions. Successful exploitation can disrupt internal knowledge sharing, project documentation, and operational workflows, potentially causing productivity losses and impacting business continuity. Public sector entities relying on XWiki for documentation or intranet services may face service outages, affecting citizen services or interdepartmental communications. The lack of authentication requirement means attackers can launch attacks from external networks, increasing exposure. Additionally, organizations with limited monitoring or rate limiting on their APIs are more vulnerable to sustained or repeated exploitation attempts. The impact is particularly critical for organizations with large wiki deployments, as the volume of data requested directly correlates with resource consumption and service degradation.

Mitigation Recommendations

The primary mitigation is to upgrade affected XWiki instances to versions 16.10.11, 17.4.4, or later, where the issue is fixed by enforcing limits on API responses. Organizations should implement API rate limiting and throttling at the web server or API gateway level to prevent excessive requests from overwhelming the system. Monitoring API usage patterns and setting alerts for unusually large or frequent requests can help detect exploitation attempts early. Network-level protections such as web application firewalls (WAFs) can be configured to block or challenge suspicious API calls. Additionally, organizations should review and restrict public access to the REST API endpoints where possible, applying authentication and authorization controls to limit exposure. Regular vulnerability scanning and patch management processes should be enforced to ensure timely updates. Finally, capacity planning and resource allocation should consider potential abuse scenarios to maintain service availability under stress.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-02T16:23:01.097Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6939efe25ab76fdc5f31bfb5

Added to database: 12/10/2025, 10:10:42 PM

Last enriched: 12/10/2025, 10:17:03 PM

Last updated: 12/11/2025, 6:00:29 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats