logo

CVE-2025-49584 org.xwiki.platform:xwiki-platform-rest-server

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-rest-server
Vulnerable Version: >=10.9 <16.4.7 || >=16.5.0-rc-1 <16.10.3 || >=17.0.0-rc-1 <17.0.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00043 pctl0.12213

Details

XWiki makes title of inaccessible pages available through the class property values REST API ### Impact The title of every single page whose reference is known can be accessed through the REST API as long as an XClass with a page property is accessible, this is the default for an XWiki installation. This allows an attacker to get titles of pages whose reference is known, one title per request. This doesn't affect fully [private wikis](https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Access%20Rights/#HPrivateWiki) as the REST endpoint checks access rights on the XClass definition. The impact on confidentiality depends on the strategy for page names. By default, page names match the title, so the impact should be low but if page names are intentionally obfuscated because the titles are sensitive, the impact could be high. ### Patches This has been fixed in XWiki 16.4.7, 16.10.3 and 17.0.0 by adding access control checks before getting the title of any page. ### Workarounds We're not aware of any workarounds.

Metadata

Created: 2025-06-13T20:42:12Z
Modified: 2025-06-13T20:42:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-mvp5-qx9c-c3fv/GHSA-mvp5-qx9c-c3fv.json
CWE IDs: ["CWE-201"]
Alternative ID: GHSA-mvp5-qx9c-c3fv
Finding: F038
Auto approve: 1