Vulnerability Description
XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the width parameter in the column macro allows remote code execution for any user who can edit any page or who can access the CKEditor converter. The width parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution when the macro has been installed by a user with programming right, or it at least allows executing Velocity code as the wiki admin. Version 1.26.5 contains a patch for the issue.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xwiki | Pro Macros | >= 1.0, < 1.26.5 |
Related Weaknesses (CWE)
References
- https://github.com/xwikisas/xwiki-pro-macros/blob/aed17fa3db4081846dbb6bdf76ba10Product
- https://github.com/xwikisas/xwiki-pro-macros/commit/05651adb4b58d03ba862d5290c64Patch
- https://github.com/xwikisas/xwiki-pro-macros/security/advisories/GHSA-hxqp-983c-ExploitVendor Advisory
- https://github.com/xwikisas/xwiki-pro-macros/security/advisories/GHSA-hxqp-983c-ExploitVendor Advisory
FAQ
What is CVE-2025-55727?
CVE-2025-55727 is a vulnerability with a CVSS score of 10.0 (CRITICAL). XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the width parameter...
How severe is CVE-2025-55727?
CVE-2025-55727 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-55727?
Check the references section above for vendor advisories and patch information. Affected products include: Xwiki Pro Macros.