Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.xwiki.platform/xwiki-platform-skin-skinx
  4. ›
  5. CVE-2025-55748

CVE-2025-55748: XWiki configuration files can be accessed through jsx and sx endpoints

September 3, 2025

It’s possible to get access and read configuration files by using URLs such as http://localhost:8080/bin/ssx/Main/WebHome?resource=../../WEB-INF/xwiki.cfg&minify=false.

This can apparently be reproduced on Tomcat instances.

References

  • github.com/advisories/GHSA-m63c-3rmg-r2cf
  • github.com/xwiki/xwiki-platform
  • github.com/xwiki/xwiki-platform/commit/9e7b4c03f2143978d891109a17159f73d4cdd318
  • github.com/xwiki/xwiki-platform/security/advisories/GHSA-m63c-3rmg-r2cf
  • jira.xwiki.org/browse/XWIKI-23109
  • nvd.nist.gov/vuln/detail/CVE-2025-55748

Code Behaviors & Features

Detect and mitigate CVE-2025-55748 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 4.2-milestone-2 before 16.10.7

Fixed versions

  • 16.10.7

Solution

Upgrade to version 16.10.7 or above.

Weakness

  • CWE-23: Relative Path Traversal

Source file

maven/org.xwiki.platform/xwiki-platform-skin-skinx/CVE-2025-55748.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 05 Sep 2025 12:19:38 +0000.