We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49587

XWiki does not require right warnings for notification displayer objects



Description

XWiki is an open-source wiki software platform. When a user without script right creates a document with an XWiki.Notifications.Code.NotificationDisplayerClass object, and later an admin edits and saves that document, the possibly malicious content of that object is output as raw HTML, allowing XSS attacks. While the notification displayer executes Velocity, the existing generic analyzer already warns admins before editing Velocity code. Note that warnings before editing documents with dangerous properties have only been introduced in XWiki 15.9, before that version, this was a known issue and the advice was simply to be careful. This vulnerability has been patched in XWiki 15.10.16, 16.4.7, and 16.10.2 by adding a required rights analyzer that warns the admin before editing about the possibly malicious code.

Reserved 2025-06-06 | Published 2025-06-13 | Updated 2025-06-13 | Assigner GitHub_M


MEDIUM: 6.4CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H

Problem types

CWE-357: Insufficient UI Warning of Dangerous Operations

Product status

>= 15.9-rc-1, < 15.10.16
affected

>= 16.0.0-rc-1, < 16.4.7
affected

>= 16.5.0-rc-1, < 16.10.2
affected

References

github.com/...atform/security/advisories/GHSA-j7p2-87q3-44w7

github.com/...ommit/55c5d568c4dc4619f37397d00d14dcdeab9c252d

jira.xwiki.org/browse/XWIKI-22470

cve.org (CVE-2025-49587)

nvd.nist.gov (CVE-2025-49587)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49587

Support options

Helpdesk Chat, Email, Knowledgebase