Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.xwiki.platform/xwiki-platform-realtime-wysiwyg-ui
  4. ›
  5. CVE-2025-23025

CVE-2025-23025: XWiki Realtime WYSIWYG Editor extension allows privilege escalation (PR) through realtime WYSIWYG editing

January 14, 2025

NOTE: The Realtime WYSIWYG Editor extension was experimental, and thus not recommended, in the versions affected by this vulnerability. It has become enabled by default, and thus recommended, starting with XWiki 16.9.0.

A user with only edit right can join a realtime editing session where others, that where already there or that may join later, have script or programming access rights. This user can then insert script rendering macros that are executed for those users in the realtime session that have script or programming rights. The inserted scripts can be used to gain more access rights.

Here’s an example that works with XWiki 15.10.9+ and 16.2.0+:

  • the attacker starts editing a wiki page in realtime (for which they have edit right)
  • another user, with script or programming access right joins the editing session (e.g. by clicking on a link / URL provided by the attacker)
  • the attacker inserts a script rendering macro, say {{velocity}}I can run scripts{{/velocity}}, in the edited content, using the WYSIWYG editor UI
  • the edited content is reloaded for both the attacker and the other user, in order to render the inserted macro
  • the attacker gets a rendering error message
  • the other user sees “I can run scripts”

The attacker can obviously use more advanced scripts to gain access rights.

Before XWiki 15.10.9 and 16.2.0 the edited content was not re-rendered for all the users in the editing sesesion, but only for the user that inserted the macro. This means that in order to reproduce the problem the other user had to insert or update a macro or save and view the content.

References

  • github.com/advisories/GHSA-rmm7-r7wr-xpfg
  • github.com/xwiki/xwiki-platform
  • github.com/xwiki/xwiki-platform/security/advisories/GHSA-rmm7-r7wr-xpfg
  • jira.xwiki.org/browse/XWIKI-21949
  • nvd.nist.gov/vuln/detail/CVE-2025-23025

Code Behaviors & Features

Detect and mitigate CVE-2025-23025 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 13.9-rc-1 before 15.10.12, all versions starting from 16.0.0-rc-1 before 16.4.1, all versions starting from 16.5.0-rc-1 before 16.6.0-rc-1

Fixed versions

  • 15.10.12
  • 16.4.1
  • 16.6.0-rc-1

Solution

Upgrade to versions 15.10.12, 16.4.1, 16.6.0-rc-1 or above.

Impact 9 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-862: Missing Authorization

Source file

maven/org.xwiki.platform/xwiki-platform-realtime-wysiwyg-ui/CVE-2025-23025.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:08 +0000.