Post

CVE-2025-24893 - XWiki Unauthenticated RCE Exploit POC

CVE-2025-24893 is a critical unauthenticated remote code execution vulnerability in XWiki (versions < 15.10.11, 16.4.1, 16.5.0RC1) caused by improper handling of Groovy expressions in the SolrSearch macro.

CVE-2025-24893 - XWiki Unauthenticated RCE Exploit POC

Summary

CVE-2025-24893 is a critical RCE vulnerability in XWiki, caused by unsafe Groovy expression handling inside the SolrSearch macro. An attacker can inject Groovy code through a crafted GET request, leading to remote code execution (no authentication required).

  • Severity: Critical (CVSS 9.8)
  • Affected: Versions < 15.10.11, 16.4.1, 16.5.0RC1

πŸ›  Technical Breakdown

The vulnerability resides in the SolrSearch macro (Main.SolrSearch) of XWiki, which handles search input using unsafe Groovy evaluation. The macro fails to sanitize user-supplied input, allowing for arbitrary code execution.

πŸ”₯ Vulnerable Endpoint

1
/xwiki/bin/get/Main/SolrSearch?media=rss&text=

An attacker can inject Groovy code into the text parameter, which is evaluated server-side due to improper input handling within the macro system.

πŸ’₯ Example Payload

1
}}}'id'.execute()

This leads to unauthenticated Remote Code Execution (RCE) on vulnerable XWiki instances.

πŸ”¬ Proof-of-Concept (PoC) Demonstration

πŸ§ͺ Target Environment

The vulnerable target is an XWiki instance running version 15.10.8, which is affected by CVE-2025-24893.

Vulnerable XWiki Interface


πŸ“‘ Preparing the Listener

Start a Netcat listener on the attacker’s machine to capture the reverse shell connection:

1
nc -lvnp 1337

Netcat Listener Active on Port 1337


πŸš€ Launching the Exploit

Run the exploit script CVE-2025-24893-dbs.py to deliver the Groovy-based RCE payload to the vulnerable XWiki endpoint.

Running Exploit Script


πŸ’» Successful Remote Shell Access

Upon successful execution, the reverse shell will connect back to the listener, granting the attacker remote access to the server.

Reverse Shell Acquired


πŸ“š References

This post is licensed under CC BY 4.0 by the author.

Β© dollarboysushil. Some rights reserved.

Using the Chirpy theme for Jekyll.