We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54385

XWiki Platform's searchDocuments API allows for SQL injection



Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions between 17.0.0-rc1 to 17.2.2 and versions 16.10.5 and below, it's possible to execute any SQL query in Oracle by using the function like DBMS_XMLGEN or DBMS_XMLQUERY. The XWiki#searchDocuments APIs pass queries directly to Hibernate without sanitization. Even when these APIs enforce a specific SELECT clause, attackers can still inject malicious code through HQL's native function support in other parts of the query (such as the WHERE clause). This is fixed in versions 16.10.6 and 17.3.0-rc-1.

Reserved 2025-07-21 | Published 2025-07-26 | Updated 2025-07-26 | Assigner GitHub_M


HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-20: Improper Input Validation

Product status

< 16.10.6
affected

>= 17.0.0-rc1, < 17.3.0-rc-1
affected

References

github.com/...atform/security/advisories/GHSA-p9qm-p942-q3w5

github.com/...ommit/7313dc9b533c70f14b7672379c8b3b63d1fd8f51

github.com/...ommit/7c4087d44ac550610b2fa413dd4f5375409265a5

docs.oracle.com/...oracle-database/19/arpls/DBMS_XMLGEN.html

jira.xwiki.org/browse/XWIKI-22728

www.xwiki.org/xwiki/bin/view/ReleaseNotes/Data/XWiki/16.10.6

cve.org (CVE-2025-54385)

nvd.nist.gov (CVE-2025-54385)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54385

Support options

Helpdesk Chat, Email, Knowledgebase