CVE-2025-32970
MEDIUM EXPLOITED NUCLEIXWiki WYSIWYG API - Open Redirect
Title source: nucleiDescription
XWiki is a generic wiki platform. In versions starting from 13.5-rc-1 to before 15.10.13, from 16.0.0-rc-1 to before 16.4.4, and from 16.5.0-rc-1 to before 16.8.0, an open redirect vulnerability in the HTML conversion request filter allows attackers to construct URLs on an XWiki instance that redirects to any URL. This issue has been patched in versions 15.10.13, 16.4.4, and 16.8.0.
Nuclei Templates (1)
XWiki WYSIWYG API - Open Redirect
MEDIUMVERIFIEDby ritikchaddha
Shodan:
html:"data-xwiki-reference"
FOFA:
body="data-xwiki-reference"
Scores
CVSS v3
6.1
EPSS
0.0007
EPSS Percentile
21.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
VulnCheck KEV
2025-09-04
CWE
CWE-601
Status
published
Products (3)
org.xwiki.platform/xwiki-platform-wysiwyg-api
13.5-rc-1 - 15.10.13Maven
xwiki/xwiki
16.8.0 rc1
xwiki/xwiki
13.5 - 15.10.13
Published
Apr 30, 2025
Tracked Since
Feb 18, 2026