CVE-2025-24893 – XWiki Unauthenticated RCE Exploit POC

CVE-2025-24893 is a critical unauthenticated remote code execution vulnerability in XWiki (versions < 15.10.11, 16.4.1, 16.5.0RC1) caused by improper handling of Groovy expressions in the SolrSearch macro.

Summary

CVE-2025-24893 is a critical RCE vulnerability in XWiki, caused by unsafe Groovy expression handling inside the SolrSearch macro. An attacker can inject Groovy code through a crafted GET request, leading to remote code execution (no authentication required).

  • Severity: Critical (CVSS 9.8)
  • Affected: Versions < 15.10.11, 16.4.1, 16.5.0RC1

๐Ÿ›  Technical Breakdown

The vulnerability resides in the SolrSearch macro (Main.SolrSearch) of XWiki, which handles search input using unsafe Groovy evaluation. The macro fails to sanitize user-supplied input, allowing for arbitrary code execution.

๐Ÿ”ฅ Vulnerable Endpoint

/xwiki/bin/get/Main/SolrSearch?media=rss&text=

An attacker can inject Groovy code into the text parameter, which is evaluated server-side due to improper input handling within the macro system.

๐Ÿ’ฅ Example Payload

{% raw %} }}}{{async async=false}}{{groovy}}'id'.execute(){{/groovy}}{{/async}} {% endraw %}

This leads to unauthenticated Remote Code Execution (RCE) on vulnerable XWiki instances.

๐Ÿ”ฌ Proof-of-Concept (PoC) Demonstration

๐Ÿงช Target Environment

The vulnerable target is an XWiki instance running version 15.10.8, which is affected by CVE-2025-24893.


๐Ÿ“ก Preparing the Listener

Start a Netcat listener on the attacker’s machine to capture the reverse shell connection:


๐Ÿš€ Launching the Exploit

Run the exploit script CVE-2025-24893-dbs.py to deliver the Groovy-based RCE payload to the vulnerable XWiki endpoint.


๐Ÿ’ป Successful Remote Shell Access

Upon successful execution, the reverse shell will connect back to the listener, granting the attacker remote access to the server.


๐Ÿ“š References

Previous Article

CVE-2024-32019 - Netdata ndsudo PATH Vulnerability Exploit (LPE to Root)

Next Article

CVE-2024-47533 - Cobbler XMLRPC Authentication Bypass RCE Exploit POC

Write a Comment

Leave a Comment

Your email address will not be published. Required fields are marked *