CVE-2025-49584

7.5 HIGH

📋 TL;DR

This vulnerability in XWiki allows attackers to access page titles through the REST API without proper authorization. It affects XWiki installations where page names are obfuscated but titles contain sensitive information. Only fully private wikis are unaffected as they have additional access controls.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: 10.9 through 16.4.6, 16.5.0-rc-1 through 16.10.2, and 17.0.0-rc-1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations where XClass with page property is accessible (default). Fully private wikis are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers can enumerate sensitive page titles, potentially revealing confidential information when page names are intentionally obfuscated but titles contain sensitive data.

🟠

Likely Case

Attackers can discover page titles for known page references, which by default match page names, resulting in low confidentiality impact for standard configurations.

🟢

If Mitigated

With proper access controls on XClass definitions or in fully private wikis, the vulnerability is prevented as the REST endpoint checks access rights.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of page references and access to REST API. One title can be retrieved per request.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.4.7, 16.10.3, 17.0.0

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mvp5-qx9c-c3fv

Restart Required: Yes

Instructions:

1. Identify your XWiki version. 2. Upgrade to 16.4.7, 16.10.3, or 17.0.0 depending on your current branch. 3. Restart the XWiki service. 4. Verify the fix by testing REST API access controls.

🔧 Temporary Workarounds

Restrict REST API Access

all

Limit access to the REST API endpoint to authorized users only using network controls or application firewalls.

Implement Fully Private Wiki

all

Configure XWiki as a fully private wiki where all access rights are strictly controlled.

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to XWiki REST API endpoints
  • Review and strengthen access controls on XClass definitions to limit exposure

🔍 How to Verify

Check if Vulnerable:

Check XWiki version against affected ranges. Test if unauthorized users can access page titles via REST API with known page references.

Check Version:

Check XWiki administration interface or configuration files for version information.

Verify Fix Applied:

After patching, verify that unauthorized access to page titles via REST API is blocked and proper access controls are enforced.

📡 Detection & Monitoring

Log Indicators:

  • Multiple unauthorized REST API requests for page titles
  • Pattern of requests to /rest/wikis/xwiki/spaces/*/pages/*/objects/XWiki.XWikiRights/

Network Indicators:

  • Unusual volume of REST API requests from single sources
  • Requests attempting to enumerate page references

SIEM Query:

source="xwiki" AND (uri_path="/rest/*" AND status=200) AND user="anonymous"

🔗 References

📤 Share & Export