PoC for CVE-2025-24893: XWiki' Remote Code Execution exploit for versions prior to 15.10.11, 16.4.1 and 16.5.0RC1.
-
Updated
Aug 22, 2025 - Python
PoC for CVE-2025-24893: XWiki' Remote Code Execution exploit for versions prior to 15.10.11, 16.4.1 and 16.5.0RC1.
CVE-2025-24893 is a critical unauthenticated remote code execution vulnerability in XWiki (versions < 15.10.11, 16.4.1, 16.5.0RC1) caused by improper handling of Groovy expressions in the SolrSearch macro.
XWiki with Let's Encrypt Using Docker Compose
PoC exploits CVE-2025-24893 , a remote code execution (RCE) vulnerability in XWiki caused by improper sandboxing in Groovy macros rendered asynchronously. It allows arbitrary command execution through injection into RSS-based SolrSearch endpoints.
Wiki Service is responsible for establishing communication with XWiki, handling XWiki related logic and forwarding it to other services.
POC exploit for CVE-2025-24893
Le site internet de l'Atelier des Médias
Este programa permite simplificar la creación de un árbol de directorios en XWiki usando el plugin de Tree Macro
Xwiki macro which displays information in short form first, while showing full details on mouse click. If multiple of these Expandable macros are arranged directly on top of each other, they form an accordion component.
XWiki is a professional wiki
XWiki Link Visualizer is an interactive extension that enables users to visually explore and analyze link relationships within XWiki pages through dynamic network graph
Add a description, image, and links to the xwiki topic page so that developers can more easily learn about it.
To associate your repository with the xwiki topic, visit your repo's landing page and select "manage topics."