logo

CVE-2025-49586 org.xwiki.platform:xwiki-platform-oldcore

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-oldcore
Vulnerable Version: >=7.2-milestone-2 <16.4.7 || >=16.5.0-rc-1 <16.10.3 || >=17.0.0-rc-1 <17.0.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:U/RC:R

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.03222 pctl0.8656

Details

XWiki allows remote code execution through preview of XClass changes in AWM editor ### Impact Any XWiki user with edit right on at least one App Within Minutes application (the default for all users XWiki) can obtain programming right/perform remote code execution by editing the application. The detailed reproduction steps can be found in the [original bug report](https://jira.xwiki.org/browse/XWIKI-22719). ### Patches This vulnerability has been fixed in XWiki 17.0.0, 16.4.7, and 16.10.3. ### Workarounds Restricting edit rights on all existing App Within Minutes applications to trusted users mitigates at least the PoC exploit, but we can't exclude that there are other ways to exploit this vulnerability.

Metadata

Created: 2025-06-13T20:46:21Z
Modified: 2025-06-13T20:46:22Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-jp4x-w9cj-97q7/GHSA-jp4x-w9cj-97q7.json
CWE IDs: ["CWE-863"]
Alternative ID: GHSA-jp4x-w9cj-97q7
Finding: F006
Auto approve: 1