CVE-2025-46554 – org.xwiki.platform:xwiki-platform-rest-server
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-rest-server
Vulnerable Version: >=1.8.1 <14.10.22 || >=15.0-rc-1 <15.10.12 || >=16.0.0-rc-1 <16.4.3 || >=16.5.0-rc-1 <16.7.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00546 pctl0.66861
Details
XWiki missing authorization when accessing the wiki level attachments list and metadata via REST API ### Impact Anyone can access the metadata of any attachment in the wiki using the wiki attachment REST endpoint. It's not filtering the result depending on current user rights, a not authenticated user could exploit this even in a totally private wiki. To reproduce: * remove view from guest on the whole wiki * logout * access http://127.0.0.1:8080/xwiki/rest/wikis/xwiki/spaces/Sandbox/pages/WebHome/attachments You get a list of attachments, while the expected result should be an empty list. ### Patches This vulnerability has been fixed in XWiki 14.10.22, 15.10.12, 16.7.0-rc-1 and 16.4.3. ### Workarounds We're not aware of any workaround except upgrading. ### References * https://jira.xwiki.org/browse/XWIKI-22424 * https://jira.xwiki.org/browse/XWIKI-22427 * https://github.com/xwiki/xwiki-platform/commit/a43e933ddeda17dad1772396e1757998260e9342#diff-0 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution Issue reported by [Lukas Monert](https://github.com/LMonert).
Metadata
Created: 2025-04-30T16:49:47Z
Modified: 2025-05-05T17:50:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-r5cr-xm48-97xp/GHSA-r5cr-xm48-97xp.json
CWE IDs: ["CWE-862"]
Alternative ID: GHSA-r5cr-xm48-97xp
Finding: F039
Auto approve: 1