Home

Description

XWiki Rendering is a generic rendering system that converts textual input in a given syntax (wiki syntax, HTML, etc) into another syntax (XHTML, etc). Versions 16.10.9 and below, 17.0.0-rc-1 through 17.4.2 and 17.5.0-rc-1 through 17.5.0 have insufficient protection against {{/html}} injection, which attackers can exploit through RCE. Any user who can edit their own profile or any other document can execute arbitrary script macros, including Groovy and Python macros, which enable remote code execution as well as unrestricted read and write access to all wiki contents. This issue is fixed in versions 16.10.10, 17.4.3 and 17.6.0-rc-1.

PUBLISHED Reserved 2025-12-02 | Published 2025-12-10 | Updated 2025-12-11 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

Product status

< 16.10.10
affected

>= 17.0.0-rc-1, < 17.4.3
affected

>= 17.5.0-rc-1, < 17.6.0-rc-1
affected

References

jira.xwiki.org/browse/XRENDERING-793 exploit

jira.xwiki.org/browse/XRENDERING-792 exploit

jira.xwiki.org/browse/XRENDERING-693 exploit

github.com/...dering/security/advisories/GHSA-9xc6-c2rm-f27p

github.com/...ommit/12b780ccd5bca5fc8f74f46648d7e02fa04fbc11

github.com/...ommit/9b71a2ee035815cfc29cebbfe81dbdd98f941d49

jira.xwiki.org/browse/XRENDERING-693

jira.xwiki.org/browse/XRENDERING-792

jira.xwiki.org/browse/XRENDERING-793

jira.xwiki.org/browse/XWIKI-23378

cve.org (CVE-2025-66474)

nvd.nist.gov (CVE-2025-66474)

Download JSON