CVE-2025-32970

MEDIUM EXPLOITED NUCLEI

XWiki WYSIWYG API - Open Redirect

Title source: nuclei

Description

XWiki is a generic wiki platform. In versions starting from 13.5-rc-1 to before 15.10.13, from 16.0.0-rc-1 to before 16.4.4, and from 16.5.0-rc-1 to before 16.8.0, an open redirect vulnerability in the HTML conversion request filter allows attackers to construct URLs on an XWiki instance that redirects to any URL. This issue has been patched in versions 15.10.13, 16.4.4, and 16.8.0.

Nuclei Templates (1)

XWiki WYSIWYG API - Open Redirect
MEDIUMVERIFIEDby ritikchaddha
Shodan: html:"data-xwiki-reference"
FOFA: body="data-xwiki-reference"

Scores

CVSS v3 6.1
EPSS 0.0007
EPSS Percentile 21.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Details

VulnCheck KEV 2025-09-04
CWE
CWE-601
Status published
Products (3)
org.xwiki.platform/xwiki-platform-wysiwyg-api 13.5-rc-1 - 15.10.13Maven
xwiki/xwiki 16.8.0 rc1
xwiki/xwiki 13.5 - 15.10.13
Published Apr 30, 2025
Tracked Since Feb 18, 2026