CVE-2025-53835

9.0 CRITICAL

📋 TL;DR

This vulnerability in XWiki Rendering allows cross-site scripting (XSS) attacks through raw HTML blocks in the XHTML syntax. Users who can edit documents (like user profiles, enabled by default) can inject arbitrary JavaScript. Affects XWiki installations from version 5.4.5 up to but not including 14.10.

💻 Affected Systems

Products:
  • XWiki Rendering
Versions: 5.4.5 to 14.9.x
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: User profile editing is enabled by default. The xdom+xml syntax remains vulnerable but is intended for testing only.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with edit permissions can execute arbitrary JavaScript in victims' browsers, potentially stealing session cookies, performing actions as the victim, or compromising user accounts.

🟠

Likely Case

Authenticated users with edit permissions can inject malicious scripts into pages they can edit, affecting other users who view those pages.

🟢

If Mitigated

With proper input validation and output encoding, the impact is reduced, but the core vulnerability remains until patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires edit permissions on documents. The advisory provides technical details but no public exploit code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.10

Vendor Advisory: https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-w3wh-g4m9-783p

Restart Required: Yes

Instructions:

1. Backup your XWiki instance. 2. Upgrade XWiki Rendering to version 14.10 or later. 3. Restart the XWiki application server. 4. Verify the upgrade was successful.

🧯 If You Can't Patch

  • Disable user profile editing functionality if not required.
  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact.

🔍 How to Verify

Check if Vulnerable:

Check XWiki Rendering version via XWiki administration interface or by examining installed packages. Versions 5.4.5 to 14.9.x are vulnerable.

Check Version:

Check XWiki admin dashboard or review XWiki configuration files for version information.

Verify Fix Applied:

Confirm XWiki Rendering version is 14.10 or later after upgrade.

📡 Detection & Monitoring

Log Indicators:

  • Unusual edit patterns to user profiles or documents, especially with HTML/JavaScript content.

Network Indicators:

  • Unexpected JavaScript execution in XWiki pages.

SIEM Query:

Search for XWiki edit logs containing suspicious HTML tags or script elements.

🔗 References

📤 Share & Export