CVE-2025-66474: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-rendering
XWiki Rendering is a generic rendering system that converts textual input in a given syntax (wiki syntax, HTML, etc) into another syntax (XHTML, etc). Versions 16.10.9 and below, 17.0.0-rc-1 through 17.4.2 and 17.5.0-rc-1 through 17.5.0 have insufficient protection against {{/html}} injection, which attackers can exploit through RCE. Any user who can edit their own profile or any other document can execute arbitrary script macros, including Groovy and Python macros, which enable remote code execution as well as unrestricted read and write access to all wiki contents. This issue is fixed in versions 16.10.10, 17.4.3 and 17.6.0-rc-1.
AI Analysis
Technical Summary
CVE-2025-66474 is a critical security vulnerability classified under CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code, commonly known as Eval Injection) affecting the XWiki Rendering system. XWiki Rendering converts input in various syntaxes into XHTML and other formats. The vulnerability exists in versions prior to 16.10.10, between 17.0.0-rc-1 and 17.4.2, and between 17.5.0-rc-1 and 17.5.0 due to insufficient sanitization of the {{/html}} directive. This flaw allows an attacker with the ability to edit their own profile or any wiki document to inject and execute arbitrary script macros, including Groovy and Python code. These macros run with the privileges of the wiki application, enabling remote code execution (RCE) on the server hosting the wiki. The attacker gains unrestricted read and write access to all wiki content, potentially leading to data exfiltration, data tampering, or full system compromise. The vulnerability requires no user interaction and no elevated privileges beyond edit rights, making it highly exploitable in environments where users have editing capabilities. The issue is addressed in patched versions 16.10.10, 17.4.3, and 17.6.0-rc-1. The CVSS v4.0 base score is 8.7 (high severity), reflecting network attack vector, low attack complexity, no privileges required beyond edit rights, no user interaction, and high impact on confidentiality, integrity, and availability. Although no active exploits have been reported, the vulnerability's nature and impact make it a critical risk for organizations using affected XWiki versions.
Potential Impact
For European organizations, this vulnerability presents a significant threat to the confidentiality, integrity, and availability of sensitive information managed within XWiki platforms. Many enterprises, educational institutions, and government agencies in Europe rely on XWiki for internal documentation, collaboration, and knowledge management. Successful exploitation could lead to unauthorized disclosure of sensitive data, modification or deletion of critical documents, and potential lateral movement within the network if the attacker gains code execution on the server. This could disrupt business operations, damage organizational reputation, and lead to regulatory compliance violations under GDPR due to data breaches. The ability to execute arbitrary code remotely without requiring elevated privileges or user interaction increases the risk of widespread compromise, especially in environments with multiple users having edit rights. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the vulnerability’s characteristics suggest it could be rapidly weaponized by threat actors targeting European entities.
Mitigation Recommendations
1. Immediate upgrade to patched versions of XWiki Rendering: 16.10.10, 17.4.3, or 17.6.0-rc-1 as applicable. 2. Restrict edit permissions strictly to trusted users; review and minimize the number of users with rights to edit profiles or wiki pages. 3. Implement application-level input validation and sanitization to detect and block script macro injections, especially those involving Groovy or Python code. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the {{/html}} injection vector. 5. Monitor wiki server logs for unusual macro execution or unauthorized profile edits indicative of exploitation attempts. 6. Isolate the wiki server within a segmented network zone with limited access to critical backend systems to contain potential compromises. 7. Conduct regular security audits and penetration testing focused on wiki platforms to identify and remediate similar injection flaws. 8. Educate users about the risks of unauthorized content editing and enforce strong authentication and session management to prevent account takeover. 9. Backup wiki content regularly and verify integrity to enable rapid recovery in case of data tampering or deletion.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Austria
CVE-2025-66474: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-rendering
Description
XWiki Rendering is a generic rendering system that converts textual input in a given syntax (wiki syntax, HTML, etc) into another syntax (XHTML, etc). Versions 16.10.9 and below, 17.0.0-rc-1 through 17.4.2 and 17.5.0-rc-1 through 17.5.0 have insufficient protection against {{/html}} injection, which attackers can exploit through RCE. Any user who can edit their own profile or any other document can execute arbitrary script macros, including Groovy and Python macros, which enable remote code execution as well as unrestricted read and write access to all wiki contents. This issue is fixed in versions 16.10.10, 17.4.3 and 17.6.0-rc-1.
AI-Powered Analysis
Technical Analysis
CVE-2025-66474 is a critical security vulnerability classified under CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code, commonly known as Eval Injection) affecting the XWiki Rendering system. XWiki Rendering converts input in various syntaxes into XHTML and other formats. The vulnerability exists in versions prior to 16.10.10, between 17.0.0-rc-1 and 17.4.2, and between 17.5.0-rc-1 and 17.5.0 due to insufficient sanitization of the {{/html}} directive. This flaw allows an attacker with the ability to edit their own profile or any wiki document to inject and execute arbitrary script macros, including Groovy and Python code. These macros run with the privileges of the wiki application, enabling remote code execution (RCE) on the server hosting the wiki. The attacker gains unrestricted read and write access to all wiki content, potentially leading to data exfiltration, data tampering, or full system compromise. The vulnerability requires no user interaction and no elevated privileges beyond edit rights, making it highly exploitable in environments where users have editing capabilities. The issue is addressed in patched versions 16.10.10, 17.4.3, and 17.6.0-rc-1. The CVSS v4.0 base score is 8.7 (high severity), reflecting network attack vector, low attack complexity, no privileges required beyond edit rights, no user interaction, and high impact on confidentiality, integrity, and availability. Although no active exploits have been reported, the vulnerability's nature and impact make it a critical risk for organizations using affected XWiki versions.
Potential Impact
For European organizations, this vulnerability presents a significant threat to the confidentiality, integrity, and availability of sensitive information managed within XWiki platforms. Many enterprises, educational institutions, and government agencies in Europe rely on XWiki for internal documentation, collaboration, and knowledge management. Successful exploitation could lead to unauthorized disclosure of sensitive data, modification or deletion of critical documents, and potential lateral movement within the network if the attacker gains code execution on the server. This could disrupt business operations, damage organizational reputation, and lead to regulatory compliance violations under GDPR due to data breaches. The ability to execute arbitrary code remotely without requiring elevated privileges or user interaction increases the risk of widespread compromise, especially in environments with multiple users having edit rights. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the vulnerability’s characteristics suggest it could be rapidly weaponized by threat actors targeting European entities.
Mitigation Recommendations
1. Immediate upgrade to patched versions of XWiki Rendering: 16.10.10, 17.4.3, or 17.6.0-rc-1 as applicable. 2. Restrict edit permissions strictly to trusted users; review and minimize the number of users with rights to edit profiles or wiki pages. 3. Implement application-level input validation and sanitization to detect and block script macro injections, especially those involving Groovy or Python code. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the {{/html}} injection vector. 5. Monitor wiki server logs for unusual macro execution or unauthorized profile edits indicative of exploitation attempts. 6. Isolate the wiki server within a segmented network zone with limited access to critical backend systems to contain potential compromises. 7. Conduct regular security audits and penetration testing focused on wiki platforms to identify and remediate similar injection flaws. 8. Educate users about the risks of unauthorized content editing and enforce strong authentication and session management to prevent account takeover. 9. Backup wiki content regularly and verify integrity to enable rapid recovery in case of data tampering or deletion.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-02T16:23:01.098Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6939efe25ab76fdc5f31bfa6
Added to database: 12/10/2025, 10:10:42 PM
Last enriched: 12/17/2025, 11:12:52 PM
Last updated: 2/4/2026, 10:47:32 PM
Views: 150
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22038: CWE-532: Insertion of Sensitive Information into Log File in Significant-Gravitas AutoGPT
HighCVE-2026-1894: Improper Authorization in WeKan
MediumCVE-2025-62616: CWE-918: Server-Side Request Forgery (SSRF) in Significant-Gravitas AutoGPT
CriticalCVE-2025-62615: CWE-918: Server-Side Request Forgery (SSRF) in Significant-Gravitas AutoGPT
CriticalCVE-2026-25585: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in InternationalColorConsortium iccDEV
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.