CVE-2025-54125
MEDIUM EXPLOITED NUCLEIXWiki Platform <17.1.0 - Info Disclosure
Title source: llmDescription
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki Platform Legacy Old Core and XWiki Platform Old Core versions 1.1 through 16.4.6, 16.5.0-rc-1 through 16.10.4 and 17.0.0-rc-1 through 17.1.0, the XML export of a page in XWiki that can be triggered by any user with view rights on a page by appending ?xpage=xml to the URL includes password and email properties stored on a document that aren't named password or email. This is fixed in versions 16.4.7, 16.10.5 and 17.2.0-rc-1. To work around this issue, the file templates/xml.vm in the deployed WAR can be deleted if the XML isn't needed. There isn't any feature in XWiki itself that depends on the XML export.
Nuclei Templates (1)
XWiki XML View - Sensitive Information Exposure
HIGHVERIFIEDby ritikchaddha
Shodan:
html:"data-xwiki-reference"
FOFA:
body="data-xwiki-reference"
Scores
CVSS v3
6.5
EPSS
0.0056
EPSS Percentile
68.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2025-09-06
CWE
CWE-359
Status
published
Products (3)
org.xwiki.platform/xwiki-platform-legacy-oldcore
1.1 - 16.4.7Maven
org.xwiki.platform/xwiki-platform-oldcore
1.1 - 16.4.7Maven
xwiki/xwiki
1.1 - 16.4.7
Published
Aug 06, 2025
Tracked Since
Feb 18, 2026