Vulnerability Description
XWiki is an open-source wiki software platform. From 16.7.0 to 16.10.11, 17.4.4, or 17.7.0, in an instance which is using the XWiki Jetty package (XJetty), a context is exposed to statically access any file located in the webapp/ folder. It allows accessing files which might contains credentials. Fixed in 16.10.11, 17.4.4, and 17.7.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xwiki | Xwiki | >= 16.7.0, < 16.10.11 |
Related Weaknesses (CWE)
References
- https://github.com/xwiki/xwiki-platform/commit/42fb063749dd88cc78196f72d7318b717Patch
- https://github.com/xwiki/xwiki-platform/commit/99a04a0e2143583f5154a43e02174155dPatch
- https://github.com/xwiki/xwiki-platform/compare/8b68d8a70b43f25391b3ee48477d7eb7Patch
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-53gx-j3p6-2rw9Third Party Advisory
- https://jira.xwiki.org/browse/XWIKI-23438Issue Tracking
FAQ
What is CVE-2025-55749?
CVE-2025-55749 is a vulnerability with a CVSS score of 7.5 (HIGH). XWiki is an open-source wiki software platform. From 16.7.0 to 16.10.11, 17.4.4, or 17.7.0, in an instance which is using the XWiki Jetty package (XJetty), a context is exposed to statically access an...
How severe is CVE-2025-55749?
CVE-2025-55749 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-55749?
Check the references section above for vendor advisories and patch information. Affected products include: Xwiki Xwiki.