CVE-2025-55748
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-03

Last updated on: 2025-09-10

Assigner: GitHub, Inc.

Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 4.2-milestone-2 through 16.10.6, configuration files are accessible through jsx and sx endpoints. It's possible to access and read configuration files by using URLs such as `http://localhost:8080/bin/ssx/Main/WebHome?resource=../../WEB-INF/xwiki.cfg&minify=false`. This is fixed in version 16.10.7.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-03
Last Modified
2025-09-10
Generated
2026-05-07
AI Q&A
2025-09-04
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
xwiki xwiki From 4.3 (inc) to 16.10.7 (exc)
xwiki xwiki From 17.0.0 (inc) to 17.3.0 (inc)
xwiki xwiki 4.2
xwiki xwiki 4.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-23 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in XWiki Platform versions 4.2-milestone-2 through 16.10.6 allows unauthorized users to access and read configuration files via jsx and sx endpoints by manipulating URLs. For example, an attacker can use a URL like `http://localhost:8080/bin/ssx/Main/WebHome?resource=../../WEB-INF/xwiki.cfg&minify=false` to retrieve sensitive configuration data. This issue is fixed in version 16.10.7.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized disclosure of sensitive configuration files, which may contain critical information such as credentials, system settings, or other sensitive data. This exposure can facilitate further attacks, compromise system security, and lead to data breaches.


What immediate steps should I take to mitigate this vulnerability?

Upgrade XWiki Platform to version 16.10.7 or later, where this vulnerability is fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart