CVE-2025-55748
BaseFortify
Publication date: 2025-09-03
Last updated on: 2025-09-10
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| xwiki | xwiki | From 4.3 (inc) to 16.10.7 (exc) |
| xwiki | xwiki | From 17.0.0 (inc) to 17.3.0 (inc) |
| xwiki | xwiki | 4.2 |
| xwiki | xwiki | 4.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-23 | The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in XWiki Platform versions 4.2-milestone-2 through 16.10.6 allows unauthorized users to access and read configuration files via jsx and sx endpoints by manipulating URLs. For example, an attacker can use a URL like `http://localhost:8080/bin/ssx/Main/WebHome?resource=../../WEB-INF/xwiki.cfg&minify=false` to retrieve sensitive configuration data. This issue is fixed in version 16.10.7.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized disclosure of sensitive configuration files, which may contain critical information such as credentials, system settings, or other sensitive data. This exposure can facilitate further attacks, compromise system security, and lead to data breaches.
What immediate steps should I take to mitigate this vulnerability?
Upgrade XWiki Platform to version 16.10.7 or later, where this vulnerability is fixed.