We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53835

XWiki Rendering is vulnerable to XSS attacks through insecure XHTML syntax



Description

XWiki Rendering is a generic rendering system that converts textual input in a given syntax (wiki syntax, HTML, etc) into another syntax (XHTML, etc). Starting in version 5.4.5 and prior to version 14.10, the XHTML syntax depended on the `xdom+xml/current` syntax which allows the creation of raw blocks that permit the insertion of arbitrary HTML content including JavaScript. This allows XSS attacks for users who can edit a document like their user profile (enabled by default). This has been fixed in version 14.10 by removing the dependency on the `xdom+xml/current` syntax from the XHTML syntax. Note that the `xdom+xml` syntax is still vulnerable to this attack. As it's main purpose is testing and its use is quite difficult, this syntax shouldn't be installed or used on a regular wiki. There are no known workarounds apart from upgrading.

Reserved 2025-07-09 | Published 2025-07-14 | Updated 2025-07-14 | Assigner GitHub_M


CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

Product status

>= 5.4.5, < 14.10
affected

References

github.com/...dering/security/advisories/GHSA-w3wh-g4m9-783p

github.com/...ommit/a4ca31f99f524b9456c64150d6f375984aa81ea7

jira.xwiki.org/browse/XRENDERING-660

cve.org (CVE-2025-53835)

nvd.nist.gov (CVE-2025-53835)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53835

Support options

Helpdesk Chat, Email, Knowledgebase