CVE-2025-66474
XWiki Rendering is a generic rendering system that converts textual input in a given syntax (wiki syntax, HTML, etc) into another syntax (XHTML, etc). Versions 16.10.9 and below, 17.0.0-rc-1 through 17.4.2 and 17.5.0-rc-1 through 17.5.0 have insufficient protection against {{/html}} injection, which attackers can exploit through RCE. Any user who can edit their own profile or any other document can execute arbitrary script macros, including Groovy and Python macros, which enable remote code execution as well as unrestricted read and write access to all wiki contents. This issue is fixed in versions 16.10.10, 17.4.3 and 17.6.0-rc-1.
Published
2025-12-10T22:16:28.003
Last Modified
2025-12-19T17:13:41.230
Status
Analyzed
Source
[email protected]
Severity
CVSSv3.1: 8.8 (HIGH)
Weaknesses
-
Type: Secondary
CWE-95
-
Type: Primary
CWE-94
Affected Vendors & Products
References
-
https://github.com/xwiki/xwiki-platform/commit/12b780ccd5bca5fc8f74f46648d7e02fa04fbc11
Patch
([email protected])
-
https://github.com/xwiki/xwiki-rendering/commit/9b71a2ee035815cfc29cebbfe81dbdd98f941d49
Patch
([email protected])
-
https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-9xc6-c2rm-f27p
Patch, Vendor Advisory
([email protected])
-
https://jira.xwiki.org/browse/XRENDERING-693
Exploit, Patch, Vendor Advisory
([email protected])
-
https://jira.xwiki.org/browse/XRENDERING-792
Exploit, Patch, Vendor Advisory
([email protected])
-
https://jira.xwiki.org/browse/XRENDERING-793
Exploit, Patch, Vendor Advisory
([email protected])
-
https://jira.xwiki.org/browse/XWIKI-23378
Patch, Vendor Advisory
([email protected])
-
https://jira.xwiki.org/browse/XRENDERING-693
Exploit, Patch, Vendor Advisory
(134c704f-9b21-4f2e-91b3-4a467353bcc0)
-
https://jira.xwiki.org/browse/XRENDERING-792
Exploit, Patch, Vendor Advisory
(134c704f-9b21-4f2e-91b3-4a467353bcc0)
-
https://jira.xwiki.org/browse/XRENDERING-793
Exploit, Patch, Vendor Advisory
(134c704f-9b21-4f2e-91b3-4a467353bcc0)