CVE-2025-46554
MEDIUM EXPLOITED NUCLEIXWiki <14.10.22, <15.10.12, <16.4.3, <16.7.0 - Info Disclosure
Title source: llmDescription
XWiki is a generic wiki platform. In versions starting from 1.8.1 to before 14.10.22, from 15.0-rc-1 to before 15.10.12, from 16.0.0-rc-1 to before 16.4.3, and from 16.5.0-rc-1 to before 16.7.0, anyone can access the metadata of any attachment in the wiki using the wiki attachment REST endpoint. There is no filtering for the results depending on current user rights, meaning an unauthenticated user could exploit this even in a private wiki. This issue has been patched in versions 14.10.22, 15.10.12, 16.4.3, and 16.7.0.
Nuclei Templates (1)
XWiki REST API - Attachments Disclosure
HIGHVERIFIEDby ritikchaddha
Shodan:
html:"data-xwiki-reference"
FOFA:
body="data-xwiki-reference"
Scores
CVSS v3
5.3
EPSS
0.0007
EPSS Percentile
20.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Details
VulnCheck KEV
2025-09-04
CWE
CWE-862
Status
published
Products (2)
org.xwiki.platform/xwiki-platform-rest-server
1.8.1 - 14.10.22Maven
xwiki/xwiki
1.8.1 - 14.10.22
Published
Apr 30, 2025
Tracked Since
Feb 18, 2026