XWiki Platform SolrSearch Macro Remote Code Execution

critical Web App Scanning Plugin ID 114912

Synopsis

XWiki Platform SolrSearch Macro Remote Code Execution

Description

XWiki Platform versions from 5.3-milestone-2 before 15.10.11 and from 16.0.0-rc-1 before 16.4.1 suffer from a Server-Side Template Injection (SSTI) due to the lack of sanitization of the SolrSearch Macro requests. By leveraging this vulnerability, a remote and unauthenticated attacker can achieve privilege escalation and achieve code execution on the vulnerable XWiki instance.

Solution

Upgrade XWiki to version 15.10.11, 16.4.1 or later.

See Also

https://github.com/advisories/GHSA-rr6p-3pfg-562j

https://jira.xwiki.org/browse/XWIKI-22149

Plugin Details

Severity: Critical

ID: 114912

Type: remote

Published: 7/10/2025

Updated: 7/10/2025

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-24893

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2025-24893

Vulnerability Information

CPE: cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/20/2025

Vulnerability Publication Date: 2/19/2025

Reference Information

CVE: CVE-2025-24893