PoC for CVE-2025-24893: XWiki' Remote Code Execution exploit for versions prior to 15.10.11, 16.4.1 and 16.5.0RC1.
-
Updated
Aug 22, 2025 - Python
PoC for CVE-2025-24893: XWiki' Remote Code Execution exploit for versions prior to 15.10.11, 16.4.1 and 16.5.0RC1.
CVE-2025-24893 is a critical unauthenticated remote code execution vulnerability in XWiki (versions < 15.10.11, 16.4.1, 16.5.0RC1) caused by improper handling of Groovy expressions in the SolrSearch macro.
XWiki with Let's Encrypt Using Docker Compose
PoC exploits CVE-2025-24893 , a remote code execution (RCE) vulnerability in XWiki caused by improper sandboxing in Groovy macros rendered asynchronously. It allows arbitrary command execution through injection into RSS-based SolrSearch endpoints.
Wiki Service is responsible for establishing communication with XWiki, handling XWiki related logic and forwarding it to other services.
POC exploit for CVE-2025-24893
An RCE vulnerability in XWiki was found allowing unauthenticated attackers to execute arbitrary Groovy code remotely without authentication or prior access.
Le site internet de l'Atelier des Médias
XWiki is a professional wiki
Este programa permite simplificar la creación de un árbol de directorios en XWiki usando el plugin de Tree Macro
Interactive Link Visualizer application for XWiki which will show end-users a sophisticated network-graph of pages present in a wiki.
XWiki Link Visualizer is an interactive extension that enables users to visually explore and analyze link relationships within XWiki pages through dynamic network graph
Add a description, image, and links to the xwiki topic page so that developers can more easily learn about it.
To associate your repository with the xwiki topic, visit your repo's landing page and select "manage topics."