Skip to main content

XWiki 14 - SQL Injection via getdeleteddocuments.vm

Medium
Exploitwebexploit
Published: Mon Jul 28 2025 (07/28/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

XWiki 14 - SQL Injection via getdeleteddocuments.vm

AI-Powered Analysis

AILast updated: 08/25/2025, 01:24:18 UTC

Technical Analysis

The reported security threat concerns an SQL Injection vulnerability in XWiki version 14, specifically via the getdeleteddocuments.vm component. XWiki is an open-source enterprise wiki platform widely used for collaborative content management. The vulnerability arises from improper sanitization or validation of user input within the getdeleteddocuments.vm template, which likely constructs SQL queries dynamically. An attacker can exploit this flaw by injecting malicious SQL code through crafted input parameters, potentially allowing unauthorized access to the underlying database. This can lead to data leakage, unauthorized data modification, or even complete compromise of the database backend. The presence of exploit code written in C indicates that a proof-of-concept or weaponized exploit exists, facilitating exploitation by attackers. Although no specific affected subversions are listed, the vulnerability is tied to XWiki 14, suggesting that all installations running this major version without patches are at risk. No official patches or mitigations are referenced, implying that users should exercise caution and monitor for vendor updates. The exploit targets web application layers, leveraging the server-side Velocity template engine (.vm files) to inject SQL commands, a common vector in web application attacks. Given the medium severity rating and the availability of exploit code, this vulnerability represents a credible threat to organizations using XWiki 14 for internal or external documentation and collaboration.

Potential Impact

For European organizations, the impact of this SQL Injection vulnerability can be significant, especially for those relying on XWiki 14 for knowledge management, documentation, and collaboration. Exploitation could lead to unauthorized disclosure of sensitive corporate information, intellectual property, or personal data, potentially violating GDPR and other data protection regulations. Data integrity may be compromised if attackers modify or delete records, disrupting business operations and damaging trust. Availability could also be affected if attackers execute destructive SQL commands or cause database crashes. Given the collaborative nature of XWiki, compromised systems might serve as a pivot point for further network infiltration or lateral movement. The medium severity suggests that while exploitation requires some technical skill, the presence of public exploit code lowers the barrier for attackers, increasing the risk of opportunistic attacks. Organizations in sectors with stringent compliance requirements, such as finance, healthcare, and government, face heightened risks due to potential regulatory penalties and reputational damage.

Mitigation Recommendations

To mitigate this threat, European organizations should immediately audit their XWiki 14 deployments for the presence of the getdeleteddocuments.vm template and assess exposure to untrusted input. Since no official patches are currently referenced, organizations should: 1) Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the vulnerable endpoint. 2) Restrict access to the affected component via network segmentation or authentication controls to limit exposure. 3) Review and sanitize all user inputs processed by Velocity templates, applying strict input validation and parameterized queries where possible. 4) Monitor logs for suspicious activity related to SQL errors or unusual database queries. 5) Engage with the XWiki community or vendor for updates and patches addressing this vulnerability. 6) Consider temporary disabling or restricting the getdeleteddocuments.vm functionality if feasible until a fix is available. 7) Conduct penetration testing focused on SQL injection vectors to verify the effectiveness of mitigations.

Need more detailed analysis?Get Pro

Technical Details

Edb Id
52384
Has Exploit Code
true
Code Language
c

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for XWiki 14 - SQL Injection via getdeleteddocuments.vm

# Exploit Title: XWiki 14 - SQL Injection via getdeleteddocuments.vm
# Google Dork: N/A
# Date: 28 July 2025
# Exploit Author: Byte Reaper
# LinkedIn: N/A
# Vendor Homepage: https://www.xwiki.org
# Software Link: https://www.xwiki.org
# Version: XWiki Platform ≤ 14.x
# Tested on: XWiki Platform ≤ 14.x
# CVE: CVE-2025-32429

## Vulnerability Description

A blind SQL Injection vulnerability exists in the XWiki Platform’s `getdeleteddocuments.vm` template, specifically via the `sort` parameter. The
... (23745 more characters)
Code Length: 24,245 characters • Language: C/C++

Threat ID: 688824f4ad5a09ad00897134

Added to database: 7/29/2025, 1:33:40 AM

Last enriched: 8/25/2025, 1:24:18 AM

Last updated: 8/31/2025, 2:40:47 AM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats