CVE-2025-66474
EUVD-2025-20242910.12.2025, 22:16
XWiki Rendering is a generic rendering system that converts textual input in a given syntax (wiki syntax, HTML, etc) into another syntax (XHTML, etc). Versions 16.10.9 and below, 17.0.0-rc-1 through 17.4.2 and 17.5.0-rc-1 through 17.5.0 have insufficient protection against {{/html}} injection, which attackers can exploit through RCE. Any user who can edit their own profile or any other document can execute arbitrary script macros, including Groovy and Python macros, which enable remote code execution as well as unrestricted read and write access to all wiki contents. This issue is fixed in versions 16.10.10, 17.4.3 and 17.6.0-rc-1.Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| xwiki | xwiki-rendering | 𝑥 < 16.10.10 |
| xwiki | xwiki-rendering | 17.0.0 ≤ 𝑥 < 17.4.3 |
| xwiki | xwiki-rendering | 17.5.0 |
| xwiki | xwiki-rendering | 17.5.0:rc1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-95 - Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. "eval").
- CWE-94 - Improper Control of Generation of Code ('Code Injection')The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
References