CVE-2025-23025

9.0 CRITICAL

📋 TL;DR

In XWiki Platform, users with only edit rights can join realtime editing sessions and insert script rendering macros that execute for users with script/programming rights. This allows privilege escalation where low-privilege users can gain higher access rights. Affects XWiki installations with the experimental Realtime WYSIWYG Editor extension enabled.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: Versions before 15.10.2, 16.4.1, and 16.6.0-rc-1
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if the experimental Realtime WYSIWYG Editor extension is installed and enabled. This extension was experimental and not recommended in affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Low-privilege user gains administrative access, leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Privilege escalation allowing attackers to modify content, access sensitive information, or install malicious extensions.

🟢

If Mitigated

Limited impact if realtime editing is disabled or proper access controls prevent unauthorized users from editing sensitive pages.

🌐 Internet-Facing: HIGH - If XWiki is publicly accessible, attackers can exploit this without authentication if edit rights are granted to anonymous users.
🏢 Internal Only: MEDIUM - Requires an authenticated user with edit rights, but internal users with such access could exploit it.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a user with edit rights and knowledge of script rendering macros. No public exploit code is known, but the vulnerability is straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 15.10.2, 16.4.1, or 16.6.0-rc-1

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-rmm7-r7wr-xpfg

Restart Required: Yes

Instructions:

1. Backup your XWiki instance. 2. Upgrade to XWiki 15.10.2, 16.4.1, or 16.6.0-rc-1. 3. Restart the XWiki service. 4. Verify the upgrade was successful.

🔧 Temporary Workarounds

Disable Realtime WYSIWYG Editor plugin

all

Disable the xwiki-realtime CKEditor plugin from the WYSIWYG editor administration section.

Navigate to Administration > WYSIWYG Editor > CKEditor Integration > Disable 'xwiki-realtime' plugin

Uninstall Realtime WYSIWYG Editor extension

all

Remove the vulnerable extension completely.

Uninstall extension: org.xwiki.platform:xwiki-platform-realtime-wysiwyg-ui

🧯 If You Can't Patch

  • Disable the realtime WYSIWYG editor plugin immediately
  • Restrict edit rights to trusted users only and audit user permissions

🔍 How to Verify

Check if Vulnerable:

Check if XWiki version is below 15.10.2, 16.4.1, or 16.6.0-rc-1 and if the Realtime WYSIWYG Editor extension is installed/enabled.

Check Version:

Check XWiki version in Administration > About XWiki or via xwiki.cfg file

Verify Fix Applied:

Verify XWiki version is 15.10.2, 16.4.1, or 16.6.0-rc-1 or higher, and confirm realtime editing functions properly without privilege escalation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual script execution in realtime editing sessions
  • Multiple users joining/leaving realtime sessions rapidly
  • Privilege escalation attempts in audit logs

Network Indicators:

  • Increased traffic to realtime editing endpoints
  • Unusual POST requests containing script macros

SIEM Query:

source="xwiki.log" AND ("realtime" OR "script macro") AND ("error" OR "unauthorized" OR "privilege")

🔗 References

📤 Share & Export