Vulnerability Description
XWiki is a generic wiki platform. In versions starting from 15.9-rc-1 to before 15.10.12, from 16.0.0-rc-1 to before 16.4.3, and from 16.5.0-rc-1 to before 16.8.0-rc-1, when a user with programming rights edits a document in XWiki that was last edited by a user without programming rights and contains an XWiki.ComponentClass, there is no warning that this will grant programming rights to this object. An attacker who created such a malicious object could use this to gain programming rights on the wiki. For this, the attacker needs to have edit rights on at least one page to place this object and then get an admin user to edit that document. This issue has been patched in versions 15.10.12, 16.4.3, and 16.8.0-rc-1.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xwiki | Xwiki | >= 15.9, < 15.10.12 |
Related Weaknesses (CWE)
References
- https://github.com/xwiki/xwiki-platform/commit/1a6f1b2e050770331c9a63d12a3fd8a36Patch
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x7wv-5qg4-vmr6PatchVendor Advisory
- https://jira.xwiki.org/browse/XWIKI-22460ExploitIssue TrackingVendor Advisory
- https://jira.xwiki.org/browse/XWIKI-22460ExploitIssue TrackingVendor Advisory
FAQ
What is CVE-2025-32973?
CVE-2025-32973 is a vulnerability with a CVSS score of 9.0 (CRITICAL). XWiki is a generic wiki platform. In versions starting from 15.9-rc-1 to before 15.10.12, from 16.0.0-rc-1 to before 16.4.3, and from 16.5.0-rc-1 to before 16.8.0-rc-1, when a user with programming ri...
How severe is CVE-2025-32973?
CVE-2025-32973 has been rated CRITICAL with a CVSS base score of 9.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-32973?
Check the references section above for vendor advisories and patch information. Affected products include: Xwiki Xwiki.