CVE-2025-49584 – org.xwiki.platform:xwiki-platform-rest-server
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-rest-server
Vulnerable Version: >=10.9 <16.4.7 || >=16.5.0-rc-1 <16.10.3 || >=17.0.0-rc-1 <17.0.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00043 pctl0.12213
Details
XWiki makes title of inaccessible pages available through the class property values REST API ### Impact The title of every single page whose reference is known can be accessed through the REST API as long as an XClass with a page property is accessible, this is the default for an XWiki installation. This allows an attacker to get titles of pages whose reference is known, one title per request. This doesn't affect fully [private wikis](https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Access%20Rights/#HPrivateWiki) as the REST endpoint checks access rights on the XClass definition. The impact on confidentiality depends on the strategy for page names. By default, page names match the title, so the impact should be low but if page names are intentionally obfuscated because the titles are sensitive, the impact could be high. ### Patches This has been fixed in XWiki 16.4.7, 16.10.3 and 17.0.0 by adding access control checks before getting the title of any page. ### Workarounds We're not aware of any workarounds.
Metadata
Created: 2025-06-13T20:42:12Z
Modified: 2025-06-13T20:42:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-mvp5-qx9c-c3fv/GHSA-mvp5-qx9c-c3fv.json
CWE IDs: ["CWE-201"]
Alternative ID: GHSA-mvp5-qx9c-c3fv
Finding: F038
Auto approve: 1