- Description
- XWiki is a generic wiki platform. In versions starting from 15.9-rc-1 to before 15.10.12, from 16.0.0-rc-1 to before 16.4.3, and from 16.5.0-rc-1 to before 16.8.0-rc-1, when a user with programming rights edits a document in XWiki that was last edited by a user without programming rights and contains an XWiki.ComponentClass, there is no warning that this will grant programming rights to this object. An attacker who created such a malicious object could use this to gain programming rights on the wiki. For this, the attacker needs to have edit rights on at least one page to place this object and then get an admin user to edit that document. This issue has been patched in versions 15.10.12, 16.4.3, and 16.8.0-rc-1.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9
- Impact score
- 6
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
- security-advisories@github.com
- CWE-862
- Hype score
- Not currently trending
🚨 CVE-2025-32973 ⚠️🔴 CRITICAL (9.1) 🏢 xwiki - xwiki-platform 🏗️ >= 15.9-rc-1, < 15.10.12 🔗 https://t.co/TnXEJfnWvS 🔗 https://t.co/zJoKKv18x1 🔗 https://t.co/pGtVtjLXfy #CyberCron #VulnAlert #InfoSec https://t.co/TfpNgC5Cl4
@cybercronai
2 May 2025
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-32973 XWiki is a generic wiki platform. In versions starting from 15.9-rc-1 to before 15.10.12, from 16.0.0-rc-1 to before 16.4.3, and from 16.5.0-rc-1 to before 16.8.0-rc-… https://t.co/cL9XL2FmPt
@CVEnew
30 Apr 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-32973: CRITICAL] XWiki versions contain a security flaw where editing a document can grant programming rights. Update to versions 15.10.12, 16.4.3, or 16.8.0-rc-1 to patch this issue.#cve,CVE-2025-32973,#cybersecurity https://t.co/qoZqJV3R5U https://t.co/nGtBssolkZ
@CveFindCom
30 Apr 2025
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7429D347-DB48-4667-8D2F-FAD12C786C31",
"versionEndExcluding": "15.10.12",
"versionStartIncluding": "15.9"
},
{
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9B04B1AC-349C-45AC-804F-6C020283508B",
"versionEndExcluding": "16.4.3",
"versionStartIncluding": "16.0.0"
},
{
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "019584A5-91D6-4548-B8EF-BD8010C8C90D",
"versionEndExcluding": "16.8.0",
"versionStartIncluding": "16.5.0"
}
],
"operator": "OR"
}
]
}
]