XWiki Platform is a generic wiki platform. Prior to 15.10.15, 16.4.6, and 16.10.0, any user can exploit the WikiManager REST API to create a new wiki, where the user could become an administrator and so performs other attacks on the farm. Note that this REST API is not bundled in XWiki Standard by default: it needs to be installed manually through the extension manager. The problem has been patched in versions 15.10.15, 16.4.6 and 16.10.0 of the REST module.
References
| Link | Resource |
|---|---|
| https://github.com/xwiki/xwiki-platform/commit/82aa670106c7f5e6238ca6ed59a52d1800e05b99 | Patch |
| https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gfp2-6qhm-7x43 | Vendor Advisory |
| https://jira.xwiki.org/browse/XWIKI-22490 | Exploit Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-03-19 18:15
Updated : 2025-05-13 13:34
NVD link : CVE-2025-29926
Mitre link : CVE-2025-29926
CVE.ORG link : CVE-2025-29926
JSON object : View
Products Affected
xwiki
- xwiki
