We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49584

XWiki makes title of inaccessible pages available through the class property values REST API



Description

XWiki is a generic wiki platform. In XWiki Platform versions 10.9 through 16.4.6, 16.5.0-rc-1 through 16.10.2, and 17.0.0-rc-1, the title of every single page whose reference is known can be accessed through the REST API as long as an XClass with a page property is accessible, this is the default for an XWiki installation. This allows an attacker to get titles of pages whose reference is known, one title per request. This doesn't affect fully private wikis as the REST endpoint checks access rights on the XClass definition. The impact on confidentiality depends on the strategy for page names. By default, page names match the title, so the impact should be low but if page names are intentionally obfuscated because the titles are sensitive, the impact could be high. This has been fixed in XWiki 16.4.7, 16.10.3 and 17.0.0 by adding access control checks before getting the title of any page.

Reserved 2025-06-06 | Published 2025-06-13 | Updated 2025-06-13 | Assigner GitHub_M


HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-201: Insertion of Sensitive Information Into Sent Data

Product status

>= 10.9, < 16.4.7
affected

>= 16.5.0-rc-1, < 16.10.3
affected

>= 17.0.0-rc-1, < 17.0.0
affected

References

github.com/...atform/security/advisories/GHSA-mvp5-qx9c-c3fv

github.com/...ommit/ee642f973a7c95d2d146fe03c81bcdee1871f4ec

jira.xwiki.org/browse/XWIKI-22736

cve.org (CVE-2025-49584)

nvd.nist.gov (CVE-2025-49584)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49584

Support options

Helpdesk Chat, Email, Knowledgebase