exploitdb
WORKING POC
by Maksim Rogov · textwebappsmultiple
https://www.exploit-db.com/exploits/52429
This Metasploit module exploits a template injection vulnerability in XWiki Platform's SolrSearch macro, allowing remote code execution via Groovy script injection. It supports both Unix and Windows targets and includes version detection for vulnerable instances.
Classification
Working Poc 100%
Target:
XWiki Platform (5.3-milestone-2 ≤ v < 15.10.11) ∨ (16.0.0-rc-1 ≤ v < 16.4.1)
No auth needed
Prerequisites:
Network access to the XWiki instance · SolrSearch macro enabled
exploitdb
WORKING POC
by Al Baradi Joy · textwebappsmultiple
https://www.exploit-db.com/exploits/52136
This exploit leverages a Groovy injection vulnerability in XWiki's SolrSearch endpoint to achieve remote code execution. The PoC sends a crafted request to execute arbitrary commands (e.g., `cat /etc/passwd`) without authentication.
Classification
Working Poc 95%
Target:
XWiki Platform up to and including 15.10.10
No auth needed
Prerequisites:
Network access to the target XWiki instance · SolrSearch endpoint enabled
nomisec
WORKING POC
20 stars
by gunzf0x · remote
https://github.com/gunzf0x/CVE-2025-24893
This is a Python-based exploit for CVE-2025-24893, targeting XWiki versions prior to 15.10.11, 16.4.1, and 16.5.0RC1. It leverages a Groovy-based command injection vulnerability in the SolrSearch endpoint to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
XWiki < 15.10.11, < 16.4.1, < 16.5.0RC1
No auth needed
Prerequisites:
Network access to the XWiki SolrSearch endpoint · Vulnerable XWiki version
nomisec
WORKING POC
16 stars
by dollarboysushil · remote
https://github.com/dollarboysushil/CVE-2025-24893-XWiki-Unauthenticated-RCE-Exploit-POC
This repository contains a functional Python-based exploit for CVE-2025-24893, an unauthenticated RCE vulnerability in XWiki. The exploit crafts a malicious Groovy payload delivered via a GET request to the SolrSearch endpoint, resulting in a reverse shell.
Classification
Working Poc 95%
Target:
XWiki < 15.10.11, < 16.4.1, < 16.5.0RC1
No auth needed
Prerequisites:
Target XWiki instance with vulnerable version · Attacker-controlled listener for reverse shell
nomisec
WORKING POC
11 stars
by b0ySie7e · remote
https://github.com/b0ySie7e/CVE-2025-24893
This is a functional exploit for CVE-2025-24893, an unauthenticated RCE in XWiki via Groovy code injection in the SolrSearch endpoint. The script sends a crafted HTTP GET request to execute arbitrary commands.
Classification
Working Poc 95%
Target:
XWiki Platform (versions ≥ 5.3-milestone-2 up to < 15.10.11, ≥ 16.0.0-rc-1 up to < 16.4.1)
No auth needed
Prerequisites:
Network access to the XWiki SolrSearch endpoint
nomisec
WORKING POC
10 stars
by iSee857 · remote
https://github.com/iSee857/CVE-2025-24893-PoC
This PoC exploits CVE-2025-24893, a remote code execution (RCE) vulnerability in XWiki via a Groovy injection in the SolrSearch endpoint. The script constructs a malicious payload to execute arbitrary Groovy commands and verifies success by checking for a specific response marker.
Classification
Working Poc 95%
Target:
XWiki (version not specified)
No auth needed
Prerequisites:
Target XWiki instance with vulnerable endpoint exposed · Network access to the target
nomisec
WORKING POC
6 stars
by Infinit3i · remote
https://github.com/Infinit3i/CVE-2025-24893
This PoC exploits CVE-2025-24893, a remote code execution vulnerability in XWiki's Groovy macro when used with async rendering. It achieves command execution by injecting Groovy expressions via RSS-based search queries and retrieving output from crafted responses.
Classification
Working Poc 95%
Target:
XWiki
No auth needed
Prerequisites:
Network access to the target XWiki instance · XWiki instance with vulnerable Groovy macro configuration
nomisec
WORKING POC
6 stars
by Hex00-0x4 · remote
https://github.com/Hex00-0x4/CVE-2025-24893-XWiki-RCE
This is a functional exploit for CVE-2025-24893, targeting an RCE vulnerability in XWiki via a crafted Groovy payload injected through the SolrSearch API endpoint. The script automates protocol detection and payload delivery, confirming exploitation by checking for sensitive data in the response.
Classification
Working Poc 95%
Target:
XWiki Platform (version unspecified)
No auth needed
Prerequisites:
Target running vulnerable XWiki instance · Network access to the target
nomisec
WORKING POC
5 stars
by hackersonsteroids · remote
https://github.com/hackersonsteroids/cve-2025-24893
This repository contains a Python-based exploit for CVE-2025-24893, a remote code execution vulnerability in XWiki Platform. The exploit uses a Groovy-based async macro to deliver a configurable reverse shell payload via a crafted URL.
Classification
Working Poc 95%
Target:
XWiki Platform
No auth needed
Prerequisites:
Python 3.6 or higher · requests library · target XWiki instance · listener setup for reverse shell
nomisec
WORKING POC
5 stars
by AliElKhatteb · poc
https://github.com/AliElKhatteb/CVE-2024-32019-POC
This PoC exploits CVE-2024-32019, a local privilege escalation vulnerability in Netdata's ndsudo due to an untrusted search path. The exploit manipulates the PATH environment variable to execute a malicious binary named 'nvme' with elevated privileges.
Classification
Working Poc 95%
Target:
Netdata (versions >= v1.45.0, < v1.45.3 and >= v1.44.0-60, < v1.45.0-169)
No auth needed
Prerequisites:
Access to a vulnerable version of Netdata · Ability to transfer and execute a binary on the target system
github
WORKING POC
4 stars
by gotr00t0day · pythonremote
https://github.com/gotr00t0day/CVE-2025-24893
This repository contains a functional Python exploit for CVE-2025-24893, targeting an SSTI vulnerability in XWiki's SolrSearch endpoint via Groovy template injection. The exploit supports command execution, vulnerability testing, and an interactive shell.
Classification
Working Poc 95%
Target:
XWiki 15.10.8 (and potentially others)
No auth needed
Prerequisites:
Network access to the XWiki SolrSearch endpoint · Python 3 with requests and beautifulsoup4 libraries
nomisec
WORKING POC
4 stars
by D3Ext · remote
https://github.com/D3Ext/CVE-2025-24893
This repository contains a functional Python-based exploit for CVE-2025-24893, targeting XWiki 15.10.10. The exploit leverages unsanitized Groovy code execution in the SolrSearch macro to achieve unauthenticated remote command execution.
Classification
Working Poc 95%
Target:
XWiki 15.10.10
No auth needed
Prerequisites:
Network access to the target XWiki instance · Vulnerable SolrSearch macro enabled
nomisec
WORKING POC
3 stars
by 570RMBR3AK3R · remote
https://github.com/570RMBR3AK3R/xwiki-cve-2025-24893-poc
This repository contains a functional PoC exploit for CVE-2025-24893, targeting XWiki's SolrSearch endpoint to achieve remote code execution via Groovy script injection. The exploit fetches and executes a remote script using curl, demonstrating arbitrary command execution on vulnerable XWiki instances.
Classification
Working Poc 95%
Target:
XWiki (versions affected by CVE-2025-24893)
No auth needed
Prerequisites:
Python 3.x · requests library · vulnerable XWiki instance · attacker-controlled server hosting a malicious script
nomisec
WORKING POC
3 stars
by nopgadget · remote
https://github.com/nopgadget/CVE-2025-24893
This is a functional exploit for CVE-2025-24893, targeting XWiki Platform with a Groovy-based RCE via SolrSearch endpoint. It includes a reverse shell payload and reconnection logic for stability.
Classification
Working Poc 95%
Target:
XWiki Platform (version not specified)
No auth needed
Prerequisites:
Network access to target · Target running vulnerable XWiki instance
github
WORKING POC
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-24893
This repository contains functional exploit code for multiple CVEs, including authentication bypass vulnerabilities in TOTOLINK devices and a scanner for Fortinet SSL VPN (CVE-2024-21762). The PoCs demonstrate the vulnerabilities with clear technical details and functional code.
Classification
Working Poc 90%
Target:
TOTOLINK LR350, TOTOLINK T6, Fortinet SSL VPN
No auth needed
Prerequisites:
network access to the target device
nomisec
WORKING POC
2 stars
by torjan0 · remote
https://github.com/torjan0/xwiki_solrsearch-rce-exploit
This repository contains a functional proof-of-concept exploit for CVE-2025-24893, an unauthenticated remote code execution vulnerability in XWiki's SolrSearch feature. The exploit leverages Groovy template injection to execute arbitrary commands or spawn a reverse shell.
Classification
Working Poc 95%
Target:
XWiki (tested on Debian 15.10.8, patched in 15.10.11 / 16.4.1 / 16.5.0RC1)
No auth needed
Prerequisites:
Network access to the vulnerable XWiki instance · Python 3.x with requests library
nomisec
WORKING POC
2 stars
by Artemir7 · poc
https://github.com/Artemir7/CVE-2025-24893-EXP
This is a functional exploit for CVE-2025-24893, targeting XWiki Platform's SolrSearch endpoint to achieve remote code execution via Groovy script injection. The PoC sends a crafted payload to execute arbitrary commands and extracts the output from the response.
Classification
Working Poc 95%
Target:
XWiki Platform (versions >= 5.3-milestone-2, < 15.10.11 and >= 16.0.0-rc-1, < 16.4.1)
No auth needed
Prerequisites:
Network access to the target XWiki instance · SolrSearch endpoint must be accessible
nomisec
WORKING POC
1 stars
by BreakingRohit · remote
https://github.com/BreakingRohit/CVE-2025-24893-PoC
This repository contains a functional Proof of Concept (PoC) for CVE-2025-24893, an unauthenticated Remote Command Execution (RCE) vulnerability in XWiki. The exploit leverages server-side template injection via the SolrSearch endpoint to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
XWiki versions up to and including 15.10.10
No auth needed
Prerequisites:
Target XWiki instance running a vulnerable version · Network access to the target
nomisec
WORKING POC
1 stars
by 80Ottanta80 · remote
https://github.com/80Ottanta80/CVE-2025-24893-PoC
This repository contains a functional Python-based exploit for CVE-2025-24893, an unauthenticated RCE vulnerability in XWiki's Groovy expression handling within the SolrSearch macro. The exploit supports both command execution and reverse shell establishment, with options for automatic listener setup.
Classification
Working Poc 95%
Target:
XWiki (versions < 15.10.11, < 16.4.1, < 16.5.0RC1)
No auth needed
Prerequisites:
Python 3 · Network connectivity to target · Vulnerable XWiki instance
github
WORKING POC
1 stars
by Yukik4z3 · pythonpoc
https://github.com/Yukik4z3/CVE-2025-24893
This repository contains a functional exploit for CVE-2025-24893, demonstrating a Groovy-based remote code execution (RCE) vulnerability. The exploit leverages a crafted HTTP request to execute arbitrary commands via a Groovy payload, with base64-encoded command injection.
Classification
Working Poc 95%
Target:
Unknown (likely a web application with Groovy support, possibly Solr or a similar Java-based system)
No auth needed
Prerequisites:
Target must be vulnerable to CVE-2025-24893 · Network access to the target
nomisec
WORKING POC
1 stars
by x0da6h · remote
https://github.com/x0da6h/POC-for-CVE-2025-24893
This PoC exploits a Groovy template injection vulnerability in XWiki, allowing arbitrary command execution via crafted payloads. The script sends commands to a vulnerable endpoint and processes the response to display output.
Classification
Working Poc 95%
Target:
XWiki (version not specified)
No auth needed
Prerequisites:
Network access to the vulnerable XWiki instance · Groovy template injection vulnerability present
nomisec
WORKING POC
1 stars
by Th3Gl0w · remote
https://github.com/Th3Gl0w/CVE-2025-24893-POC
This is a functional proof-of-concept exploit for CVE-2025-24893, targeting an XWiki Groovy RCE vulnerability. It allows command execution or reverse shell establishment via a crafted payload.
Classification
Working Poc 95%
Target:
XWiki (version not specified)
No auth needed
Prerequisites:
Target URL · Network connectivity to target · Bun runtime installed
nomisec
WORKING POC
1 stars
by IIIeJlyXaKapToIIIKu · remote
https://github.com/IIIeJlyXaKapToIIIKu/CVE-2025-24893-XWiki-unauthenticated-RCE-via-SolrSearch
This repository contains a functional Python exploit for CVE-2025-24893, an unauthenticated RCE vulnerability in XWiki via the SolrSearch endpoint. The exploit leverages Groovy code injection through improperly sanitized input in Freemarker templates.
Classification
Working Poc 100%
Target:
XWiki (versions ≤ 15.10.10, ≤ 14.10.16)
No auth needed
Prerequisites:
Network access to the XWiki SolrSearch endpoint · Python 3 environment for the exploit script
nomisec
WORKING POC
1 stars
by Kai7788 · remote
https://github.com/Kai7788/CVE-2025-24893-RCE-PoC
This PoC exploits a Server-Side Template Injection (SSTI) vulnerability in XWiki, allowing remote command execution via Groovy code injection. It provides an interactive shell to execute commands on the target system.
Classification
Working Poc 95%
Target:
XWiki (version not specified)
No auth needed
Prerequisites:
Network access to the target XWiki instance · XWiki with vulnerable SolrSearch endpoint
nomisec
WORKING POC
by rippsec · remote
https://github.com/rippsec/CVE-2025-24893-XWiki-SSTI-RCE
This repository contains a functional exploit for CVE-2025-24893, an SSTI vulnerability in XWiki that allows unauthenticated RCE via the SolrSearch endpoint. The exploit uses a Groovy template injection payload to execute arbitrary commands.
Classification
Working Poc 100%
Target:
XWiki
No auth needed
Prerequisites:
Network access to the XWiki instance
nomisec
WORKING POC
by Retro023 · remote
https://github.com/Retro023/CVE-2025-24893-POC
This is a functional Python-based exploit for CVE-2025-24893, which leverages Groovy injection in XWiki's SolrSearch endpoint to achieve remote code execution. The script sends user-provided commands via a crafted payload and extracts the output from the response.
Classification
Working Poc 95%
Target:
XWiki Platform < 15.10.11, < 16.4.1, < 16.5.0RC1
No auth needed
Prerequisites:
Network access to the XWiki SolrSearch endpoint · Vulnerable version of XWiki
nomisec
WORKING POC
by nohack1212 · remote
https://github.com/nohack1212/CVE-2025-24893-
This PoC exploits a remote code execution vulnerability in XWiki by injecting a Groovy payload via the SolrSearch endpoint. It confirms vulnerability by executing a simple 'id' command and extracting the output.
Classification
Working Poc 90%
Target:
XWiki (version not specified)
No auth needed
Prerequisites:
Network access to the target XWiki instance · SolrSearch endpoint accessible
nomisec
WORKING POC
by TomKingori · remote
https://github.com/TomKingori/xwiki-cve-2025-24893-exploit
This is a functional exploit for CVE-2025-24893, targeting unauthenticated RCE in XWiki via Groovy script injection in the SolrSearch RSS feed handler. It constructs a base64-encoded reverse shell payload and delivers it through a crafted GET request.
Classification
Working Poc 95%
Target:
XWiki < 15.10.9
No auth needed
Prerequisites:
Python 3 · requests library · network access to target
nomisec
WORKING POC
by ibadovulfat · poc
https://github.com/ibadovulfat/CVE-2025-24893
The repository contains a functional Python exploit for CVE-2025-24893, an unauthenticated RCE vulnerability in XWiki's SolrSearch macro. The exploit crafts a malicious Groovy payload and sends it via a GET request to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
XWiki (versions prior to 15.10.11, 16.4.1, 16.5.0RC1)
No auth needed
Prerequisites:
Target URL with vulnerable XWiki instance · Network access to the target
nomisec
WORKING POC
by ibadovulfat · remote
https://github.com/ibadovulfat/CVE-2025-24893_HackTheBox-Editor-Writeup
This repository contains a Python-based exploit for CVE-2025-24893, an unauthenticated Remote Code Execution (RCE) vulnerability in XWiki. The exploit leverages improper Groovy expression evaluation in the SolrSearch macro to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
XWiki (versions prior to 15.10.11, 16.4.1, and 16.5.0RC1)
No auth needed
Prerequisites:
Network access to the vulnerable XWiki instance · Python 3 environment to run the exploit
nomisec
WORKING POC
by o0wo0o · remote
https://github.com/o0wo0o/CVE-2025-24893_Shell
This exploit leverages a Groovy template injection vulnerability in XWiki's SolrSearch endpoint to achieve remote code execution. It sends a crafted payload via the 'text' parameter, which executes arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
XWiki (version not specified)
No auth needed
Prerequisites:
Network access to the target XWiki instance · SolrSearch endpoint must be exposed
nomisec
WORKING POC
by 0xDTC · remote
https://github.com/0xDTC/XWiki-Platform-RCE-CVE-2025-24893
This repository contains a Bash-based exploit for CVE-2025-24893, targeting an unauthenticated RCE vulnerability in XWiki Platform via Groovy code injection in the SolrSearch macro. The PoC demonstrates command execution and includes detailed technical documentation.
Classification
Working Poc 95%
Target:
XWiki Platform (5.3-milestone-2 through 15.10.10, 16.0.0-rc-1 through 16.4.0)
No auth needed
Prerequisites:
curl · jq · Bash shell · target with vulnerable XWiki instance
github
WORKING POC
by kimtangker · pythonremote
https://github.com/kimtangker/CVE-2025-24893
This repository contains a functional exploit for CVE-2025-24893, targeting XWiki Platform versions up to 15.10.10 via a SolrSearch template injection vulnerability leading to RCE. The exploit includes version detection, vulnerability validation, and command execution capabilities.
Classification
Working Poc 90%
Target:
XWiki Platform <= 15.10.10
Auth required
Prerequisites:
XWiki instance with SolrSearch enabled · Administrator privileges to grant script rights
github
WORKING POC
by Y2F05p2w · pythonremote
https://github.com/Y2F05p2w/CVE-2025-24893
This repository contains a functional Python-based exploit for CVE-2025-24893, demonstrating a Server-Side Template Injection (SSTI) vulnerability in XWiki. The exploit leverages Groovy code execution via template macros to achieve remote command execution (RCE) on vulnerable instances.
Classification
Working Poc 95%
Target:
XWiki (version not specified)
No auth needed
Prerequisites:
Network access to the XWiki instance · XWiki instance with vulnerable SSTI endpoint
nomisec
WORKING POC
by Bishben · remote
https://github.com/Bishben/xwiki-15.10.8-reverse-shell-cve-2025-24893
This Python script exploits CVE-2025-24893, a Remote Code Execution vulnerability in XWiki up to version 15.10.10, by injecting a Base64-encoded reverse shell payload via a Groovy template in the URL. It requires a listener to be set up beforehand.
Classification
Working Poc 95%
Target:
XWiki up to 15.10.10
No auth needed
Prerequisites:
Target XWiki instance · Network access to the target · Listener set up on attacker's machine
nomisec
WORKING POC
by andwati · remote
https://github.com/andwati/CVE-2025-24893
This exploit leverages a Groovy script injection vulnerability in XWiki's SolrSearch endpoint to achieve remote code execution (RCE). The payload is URL-encoded and injected via the 'text' parameter, allowing arbitrary command execution.
Classification
Working Poc 95%
Target:
XWiki (version not specified)
No auth needed
Prerequisites:
Target XWiki instance with vulnerable SolrSearch endpoint · Network access to the target
nomisec
WORKING POC
by mah4nzfr · remote
https://github.com/mah4nzfr/CVE-2025-24893
This is a functional Bash script PoC for CVE-2025-24893, exploiting an RCE vulnerability in XWiki Platform via Groovy code injection in the SolrSearch endpoint. It sends a reverse shell payload to a target URL using curl.
Classification
Working Poc 95%
Target:
XWiki Platform (versions 5.4 to 15.10.11 and 16.0.0 to 16.4.1)
No auth needed
Prerequisites:
Target XWiki instance with vulnerable version · Network access to the target · Listener setup for reverse shell
nomisec
WORKING POC
by CMassa · remote
https://github.com/CMassa/CVE-2025-24893
This is a functional PoC exploit for CVE-2025-24893, an unauthenticated RCE vulnerability in XWiki. It leverages Groovy code injection via the SolrSearch Macro to execute arbitrary commands on vulnerable XWiki instances.
Classification
Working Poc 95%
Target:
XWiki (versions prior to 15.10.11, 16.4.1, and 16.5.0RC1)
No auth needed
Prerequisites:
Network access to the target XWiki instance · Vulnerable version of XWiki
nomisec
WORKING POC
by alaxar · remote
https://github.com/alaxar/CVE-2025-24893
This is a functional exploit for CVE-2025-24893, an unauthenticated RCE vulnerability in XWiki. It leverages a Groovy injection in the SolrSearch endpoint to execute arbitrary commands via a crafted RSS feed request.
Classification
Working Poc 95%
Target:
XWiki Platform (versions before 15.10.11, 16.4.1, and 16.5.0RC1)
No auth needed
Prerequisites:
Network access to the vulnerable XWiki instance · SolrSearch endpoint enabled
nomisec
WORKING POC
by The-Red-Serpent · remote
https://github.com/The-Red-Serpent/CVE-2025-24893
This repository contains a functional proof-of-concept exploit for CVE-2025-24893, demonstrating remote code execution in XWiki via Groovy injection. The exploit uses a crafted payload to execute arbitrary commands on vulnerable XWiki instances.
Classification
Working Poc 95%
Target:
XWiki Platform versions prior to 15.10.11, 16.4.1, and 16.5.0RC1
No auth needed
Prerequisites:
Network access to the target XWiki instance · Vulnerable version of XWiki
nomisec
WORKING POC
by investigato · remote
https://github.com/investigato/cve-2025-24893-poc
This is a functional Rust-based PoC for CVE-2025-24893, exploiting an unauthenticated Groovy template injection in XWiki's SolrSearch endpoint to achieve remote code execution via a reverse shell payload.
Classification
Working Poc 95%
Target:
XWiki < 15.10.11, >= 16.0.0 and < 16.4.1
No auth needed
Prerequisites:
Network access to the target XWiki instance · Listener set up for reverse shell
nomisec
WORKING POC
by zs1n · remote
https://github.com/zs1n/CVE-2025-24893
This is a functional Python-based PoC for CVE-2025-24893, exploiting a Groovy injection vulnerability in XWiki Platform 15.10.10 via the SolrSearch endpoint. It allows unauthenticated remote code execution by injecting a Groovy payload through the RSS parameter.
Classification
Working Poc 95%
Target:
XWiki Platform 15.10.10
No auth needed
Prerequisites:
Network access to the target XWiki instance · XWiki Platform 15.10.10 or vulnerable version
nomisec
WORKING POC
by AzureADTrent · remote
https://github.com/AzureADTrent/CVE-2025-24893-Reverse-Shell
This is a functional PoC exploit for CVE-2025-24893, targeting XWiki's SolrSearch endpoint to achieve RCE via Groovy macro injection. It sends a reverse shell payload using `busybox nc` to the attacker's specified IP and port.
Classification
Working Poc 95%
Target:
XWiki (versions affected by CVE-2025-24893)
No auth needed
Prerequisites:
Target XWiki instance with vulnerable SolrSearch endpoint · Network connectivity to the target · Attacker-controlled listener for reverse shell
nomisec
WORKING POC
by gmh5225 · poc
https://github.com/gmh5225/CVE-2025-24893-RCE-PoC
This repository contains a functional Python-based exploit for CVE-2025-24893, demonstrating remote code execution (RCE) via Server-Side Template Injection (SSTI) in XWiki. The exploit leverages Groovy code injection through a crafted URL payload to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
XWiki (version not specified)
No auth needed
Prerequisites:
Target must be running a vulnerable version of XWiki · Network access to the XWiki instance
nomisec
WORKING POC
by dhiaZnaidi · remote
https://github.com/dhiaZnaidi/CVE-2025-24893-PoC
This is a functional PoC exploit for CVE-2025-24893, targeting an unauthenticated RCE vulnerability in XWiki. It leverages Groovy script injection via the SolrSearch endpoint to execute arbitrary shell commands.
Classification
Working Poc 95%
Target:
XWiki (version not specified)
No auth needed
Prerequisites:
Target XWiki instance with vulnerable SolrSearch endpoint · Network access to the target
vulncheck_xdb
WORKING POC
remote
https://github.com/hitchy22/xwiki-exploit
The repository contains a functional exploit for CVE-2025-24893, targeting XWiki Platform versions >= 5.3-milestone-2 and <= 16.0.0-rc-1. The exploit leverages a Groovy-based injection via the SolrSearch endpoint to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
XWiki Platform (>= 5.3-milestone-2 and <= 16.0.0-rc-1)
No auth needed
Prerequisites:
Target XWiki instance with vulnerable version · Network access to the target
metasploit
WORKING POC
EXCELLENT
by Maksim Rogov, John Kwak · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/xwiki_unauth_rce_cve_2025_24893.rb
This Metasploit module exploits a template injection vulnerability in XWiki Platform's SolrSearch macro, allowing unauthenticated remote code execution via Groovy script injection. The exploit constructs a payload that executes arbitrary commands on Unix or Windows systems.
Classification
Working Poc 100%
Target:
XWiki Platform versions >= 5.3-milestone-2 and < 15.10.11, and versions >= 16.0.0-rc-1 and < 16.4.1
No auth needed
Prerequisites:
Network access to the XWiki instance · SolrSearch macro enabled