XWiki is a generic wiki platform. In versions starting from 1.8 and prior to 15.10.16, 16.4.6, and 16.10.1, it is possible for a remote unauthenticated user to escape from the HQL execution context and perform a blind SQL injection to execute arbitrary SQL statements on the database backend, including when "Prevent unregistered users from viewing pages, regardless of the page rights" and "Prevent unregistered users from editing pages, regardless of the page rights" options are enabled. Depending on the used database backend, the attacker may be able to not only obtain confidential information such as password hashes from the database, but also execute UPDATE/INSERT/DELETE queries. This issue has been patched in versions 16.10.1, 16.4.6 and 15.10.16. There is no known workaround, other than upgrading XWiki.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Xwiki
Xwiki xwiki |
|
CPEs | cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* | |
Vendors & Products |
Xwiki
Xwiki xwiki |
|
Metrics |
cvssV3_1
|
Wed, 23 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 23 Apr 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | XWiki is a generic wiki platform. In versions starting from 1.8 and prior to 15.10.16, 16.4.6, and 16.10.1, it is possible for a remote unauthenticated user to escape from the HQL execution context and perform a blind SQL injection to execute arbitrary SQL statements on the database backend, including when "Prevent unregistered users from viewing pages, regardless of the page rights" and "Prevent unregistered users from editing pages, regardless of the page rights" options are enabled. Depending on the used database backend, the attacker may be able to not only obtain confidential information such as password hashes from the database, but also execute UPDATE/INSERT/DELETE queries. This issue has been patched in versions 16.10.1, 16.4.6 and 15.10.16. There is no known workaround, other than upgrading XWiki. | |
Title | org.xwiki.platform:xwiki-platform-rest-server allows SQL injection in query endpoint of REST API | |
Weaknesses | CWE-89 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-04-23T15:33:03.732Z
Updated: 2025-04-23T16:15:40.344Z
Reserved: 2025-04-14T21:47:11.454Z
Link: CVE-2025-32969

Updated: 2025-04-23T16:15:00.547Z

Status : Analyzed
Published: 2025-04-23T16:15:47.797
Modified: 2025-04-30T15:50:37.270
Link: CVE-2025-32969

No data.