We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54124

XWiki Platform: Any user with editing rights can access password properties through Database List Properties



Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki Platform Legacy Old Core and XWiki Platform Old Core versions 9.8-rc-1 through 16.4.6, 16.5.0-rc-1 through 16.10.4, and 17.0.0-rc-1 through 17.1.0, any user with editing rights can create an XClass with a database list property that references a password property. When adding an object of that XClass, the content of that password property is displayed. In practice, with a standard rights setup, this means that any user with an account on the wiki can access password hashes of all users, and possibly other password properties (with hashed or plain storage) that are on pages that the user can view. This issue is fixed in versions 16.4.7, 16.10.5 and 17.2.0-rc-1.

Reserved 2025-07-16 | Published 2025-08-05 | Updated 2025-08-05 | Assigner GitHub_M


HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-359: Exposure of Private Personal Information to an Unauthorized Actor

Product status

>= 9.8-rc-1, < 16.4.7
affected

>= 16.5.0-rc-1, < 16.10.5
affected

>= 17.0.0-rc-1, < 17.2.0-rc-1
affected

References

github.com/...atform/security/advisories/GHSA-r38m-cgpg-qj69

github.com/...ommit/f2ca8649cba2ed3765061660bf5c7f801afa0b24

jira.xwiki.org/browse/XWIKI-22811

cve.org (CVE-2025-54124)

nvd.nist.gov (CVE-2025-54124)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54124

Support options

Helpdesk Chat, Email, Knowledgebase