CVE-2025-32429

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical SQL injection vulnerability in XWiki Platform that allows unauthenticated attackers to execute arbitrary SQL commands via the 'sort' parameter in getdeleteddocuments.vm. The vulnerability affects all XWiki instances running vulnerable versions, potentially compromising database integrity and confidentiality.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: 9.4-rc-1 through 16.10.5 and 17.0.0-rc-1 through 17.2.2
Operating Systems: All platforms running XWiki
Default Config Vulnerable: ⚠️ Yes
Notes: All XWiki installations within the affected version ranges are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, privilege escalation, and potential remote code execution via database functions.

🟠

Likely Case

Data exfiltration, unauthorized data modification, and potential authentication bypass through database manipulation.

🟢

If Mitigated

Limited impact if proper input validation and parameterized queries are implemented, though SQL injection remains a serious threat.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable without authentication and affects internet-facing wiki instances directly.
🏢 Internal Only: HIGH - Even internal instances are vulnerable to insider threats or compromised internal accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via ORDER BY parameter is well-understood and easily weaponized. No authentication required makes exploitation trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.10.6 and 17.3.0-rc-1

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vr59-gm53-v7cq

Restart Required: Yes

Instructions:

1. Backup your XWiki instance and database. 2. Download and install XWiki version 16.10.6 or 17.3.0-rc-1 from official sources. 3. Follow XWiki upgrade documentation for your specific deployment. 4. Restart the XWiki service. 5. Verify the fix by checking version and testing the vulnerable endpoint.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall or input validation to block SQL injection patterns in the 'sort' parameter

# Configure WAF rules to block SQL patterns in GET parameters
# Example mod_security rule: SecRule ARGS:sort "@detectSQLi" "id:1001,phase:2,deny"

Access Restriction

linux

Restrict access to the vulnerable endpoint using network controls or authentication

# Apache/Nginx config to restrict /getdeleteddocuments.vm
location ~* /getdeleteddocuments\.vm$ { deny all; }

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries for all database interactions
  • Deploy web application firewall with SQL injection detection rules and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if your XWiki version falls within affected ranges and test the /getdeleteddocuments.vm endpoint with SQL injection payloads in the 'sort' parameter.

Check Version:

Check XWiki administration panel or view /xwiki/bin/view/Main/WebHome page source for version information

Verify Fix Applied:

After patching, verify the version is 16.10.6+ or 17.3.0-rc-1+, and test that SQL injection attempts in the 'sort' parameter are properly sanitized or rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple requests to /getdeleteddocuments.vm with suspicious 'sort' parameters
  • Database error messages containing SQL syntax errors

Network Indicators:

  • HTTP requests with SQL keywords (UNION, SELECT, INSERT) in GET parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND uri="/getdeleteddocuments.vm" AND (param_sort CONTAINS "UNION" OR param_sort CONTAINS "SELECT" OR param_sort CONTAINS "INSERT")

🔗 References

📤 Share & Export