CVE-2025-24893

CRITICAL KEV NUCLEI LAB

XWiki Platform - Remote Code Execution

Title source: nuclei

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any guest can perform arbitrary remote code execution through a request to `SolrSearch`. This impacts the confidentiality, integrity and availability of the whole XWiki installation. To reproduce on an instance, without being logged in, go to `<host>/xwiki/bin/get/Main/SolrSearch?media=rss&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28"Hello%20from"%20%2B%20"%20search%20text%3A"%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20`. If there is an output, and the title of the RSS feed contains `Hello from search text:42`, then the instance is vulnerable. This vulnerability has been patched in XWiki 15.10.11, 16.4.1 and 16.5.0RC1. Users are advised to upgrade. Users unable to upgrade may edit `Main.SolrSearchMacros` in `SolrSearchMacros.xml` on line 955 to match the `rawResponse` macro in `macros.vm#L2824` with a content type of `application/xml`, instead of simply outputting the content of the feed.

Exploits (51)

exploitdb WORKING POC
by Maksim Rogov · textwebappsmultiple
https://www.exploit-db.com/exploits/52429
exploitdb WORKING POC
by Al Baradi Joy · textwebappsmultiple
https://www.exploit-db.com/exploits/52136
nomisec WORKING POC 20 stars
by gunzf0x · remote
https://github.com/gunzf0x/CVE-2025-24893
nomisec WORKING POC 16 stars
by dollarboysushil · remote
https://github.com/dollarboysushil/CVE-2025-24893-XWiki-Unauthenticated-RCE-Exploit-POC
nomisec WORKING POC 11 stars
by b0ySie7e · remote
https://github.com/b0ySie7e/CVE-2025-24893
nomisec WORKING POC 10 stars
by iSee857 · remote
https://github.com/iSee857/CVE-2025-24893-PoC
nomisec WORKING POC 6 stars
by Infinit3i · remote
https://github.com/Infinit3i/CVE-2025-24893
nomisec WORKING POC 6 stars
by Hex00-0x4 · remote
https://github.com/Hex00-0x4/CVE-2025-24893-XWiki-RCE
nomisec WORKING POC 5 stars
by hackersonsteroids · remote
https://github.com/hackersonsteroids/cve-2025-24893
nomisec WORKING POC 5 stars
by AliElKhatteb · poc
https://github.com/AliElKhatteb/CVE-2024-32019-POC
github WORKING POC 4 stars
by gotr00t0day · pythonremote
https://github.com/gotr00t0day/CVE-2025-24893
nomisec WORKING POC 4 stars
by D3Ext · remote
https://github.com/D3Ext/CVE-2025-24893
nomisec WORKING POC 3 stars
by 570RMBR3AK3R · remote
https://github.com/570RMBR3AK3R/xwiki-cve-2025-24893-poc
nomisec WORKING POC 3 stars
by nopgadget · remote
https://github.com/nopgadget/CVE-2025-24893
github WORKING POC 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-24893
nomisec WORKING POC 2 stars
by torjan0 · remote
https://github.com/torjan0/xwiki_solrsearch-rce-exploit
nomisec WORKING POC 2 stars
by Artemir7 · poc
https://github.com/Artemir7/CVE-2025-24893-EXP
nomisec WORKING POC 1 stars
by BreakingRohit · remote
https://github.com/BreakingRohit/CVE-2025-24893-PoC
nomisec WORKING POC 1 stars
by 80Ottanta80 · remote
https://github.com/80Ottanta80/CVE-2025-24893-PoC
github WORKING POC 1 stars
by Yukik4z3 · pythonpoc
https://github.com/Yukik4z3/CVE-2025-24893
nomisec WORKING POC 1 stars
by x0da6h · remote
https://github.com/x0da6h/POC-for-CVE-2025-24893
nomisec WORKING POC 1 stars
by Th3Gl0w · remote
https://github.com/Th3Gl0w/CVE-2025-24893-POC
nomisec WORKING POC 1 stars
by IIIeJlyXaKapToIIIKu · remote
https://github.com/IIIeJlyXaKapToIIIKu/CVE-2025-24893-XWiki-unauthenticated-RCE-via-SolrSearch
nomisec WORKING POC 1 stars
by Kai7788 · remote
https://github.com/Kai7788/CVE-2025-24893-RCE-PoC
nomisec WORKING POC
by rippsec · remote
https://github.com/rippsec/CVE-2025-24893-XWiki-SSTI-RCE
nomisec WORKING POC
by Retro023 · remote
https://github.com/Retro023/CVE-2025-24893-POC
nomisec WORKING POC
by nohack1212 · remote
https://github.com/nohack1212/CVE-2025-24893-
nomisec WORKING POC
by TomKingori · remote
https://github.com/TomKingori/xwiki-cve-2025-24893-exploit
nomisec WORKING POC
by ibadovulfat · poc
https://github.com/ibadovulfat/CVE-2025-24893
nomisec WORKING POC
by ibadovulfat · remote
https://github.com/ibadovulfat/CVE-2025-24893_HackTheBox-Editor-Writeup
nomisec WORKING POC
by o0wo0o · remote
https://github.com/o0wo0o/CVE-2025-24893_Shell
nomisec WORKING POC
by 0xDTC · remote
https://github.com/0xDTC/XWiki-Platform-RCE-CVE-2025-24893
github WORKING POC
by kimtangker · pythonremote
https://github.com/kimtangker/CVE-2025-24893
github WORKING POC
by Y2F05p2w · pythonremote
https://github.com/Y2F05p2w/CVE-2025-24893
nomisec WORKING POC
by Bishben · remote
https://github.com/Bishben/xwiki-15.10.8-reverse-shell-cve-2025-24893
nomisec WORKING POC
by andwati · remote
https://github.com/andwati/CVE-2025-24893
nomisec WORKING POC
by mah4nzfr · remote
https://github.com/mah4nzfr/CVE-2025-24893
nomisec WORKING POC
by CMassa · remote
https://github.com/CMassa/CVE-2025-24893
nomisec WORKING POC
by alaxar · remote
https://github.com/alaxar/CVE-2025-24893
nomisec WORKING POC
by The-Red-Serpent · remote
https://github.com/The-Red-Serpent/CVE-2025-24893
nomisec WORKING POC
by investigato · remote
https://github.com/investigato/cve-2025-24893-poc
nomisec WORKING POC
by zs1n · remote
https://github.com/zs1n/CVE-2025-24893
nomisec WORKING POC
by AzureADTrent · remote
https://github.com/AzureADTrent/CVE-2025-24893-Reverse-Shell
nomisec WORKING POC
by gmh5225 · poc
https://github.com/gmh5225/CVE-2025-24893-RCE-PoC
nomisec WORKING POC
by dhiaZnaidi · remote
https://github.com/dhiaZnaidi/CVE-2025-24893-PoC
vulncheck_xdb WORKING POC
remote
https://github.com/hitchy22/xwiki-exploit
metasploit WORKING POC EXCELLENT
by Maksim Rogov, John Kwak · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/xwiki_unauth_rce_cve_2025_24893.rb

Nuclei Templates (1)

XWiki Platform - Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: html:"data-xwiki-reference"
FOFA: body="data-xwiki-reference"

Scores

CVSS v3 9.8
EPSS 0.9395
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2025-10-30
VulnCheck KEV 2025-03-19
ENISA EUVD EUVD-2025-4562
CWE
CWE-95 CWE-94
Status published
Products (3)
org.xwiki.platform/xwiki-platform-search-solr-ui 5.3-milestone-2 - 15.10.11Maven
xwiki/xwiki 5.3 (3 CPE variants)
xwiki/xwiki 5.4 - 15.10.11
Published Feb 20, 2025
KEV Added Oct 30, 2025
Tracked Since Feb 18, 2026