Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.xwiki.platform/xwiki-platform-refactoring-default
  4. ›
  5. CVE-2025-49580

CVE-2025-49580: XWiki allows privilege escalation through link refactoring

June 13, 2025

Pages can gain script or programming rights when they contain a link and the target of the link is renamed or moved. This might lead to execution of scripts contained in xobjects that should have never been executed. This vulnerability affects all version of XWiki since 8.2 and 7.4.5.

References

  • github.com/advisories/GHSA-jm43-hrq7-r7w6
  • github.com/xwiki/xwiki-platform
  • github.com/xwiki/xwiki-platform/commit/ab209acd780da69a4c5ff77ff011efd698273cec
  • github.com/xwiki/xwiki-platform/security/advisories/GHSA-jm43-hrq7-r7w6
  • jira.xwiki.org/browse/XWIKI-22836
  • nvd.nist.gov/vuln/detail/CVE-2025-49580

Code Behaviors & Features

Detect and mitigate CVE-2025-49580 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 7.4.5, all versions starting from 8.2 before 16.4.7, all versions starting from 16.5.0-rc-1 before 16.10.4, all versions starting from 17.0.0-rc-1 before 17.1.0-rc-1

Fixed versions

  • 17.1.0-rc-1
  • 16.10.4
  • 16.4.7

Solution

Upgrade to versions 16.10.4, 16.4.7, 17.1.0-rc-1 or above.

Weakness

  • CWE-266: Incorrect Privilege Assignment

Source file

maven/org.xwiki.platform/xwiki-platform-refactoring-default/CVE-2025-49580.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:18:24 +0000.