CVE-2025-54125

MEDIUM EXPLOITED NUCLEI

XWiki Platform <17.1.0 - Info Disclosure

Title source: llm

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki Platform Legacy Old Core and XWiki Platform Old Core versions 1.1 through 16.4.6, 16.5.0-rc-1 through 16.10.4 and 17.0.0-rc-1 through 17.1.0, the XML export of a page in XWiki that can be triggered by any user with view rights on a page by appending ?xpage=xml to the URL includes password and email properties stored on a document that aren't named password or email. This is fixed in versions 16.4.7, 16.10.5 and 17.2.0-rc-1. To work around this issue, the file templates/xml.vm in the deployed WAR can be deleted if the XML isn't needed. There isn't any feature in XWiki itself that depends on the XML export.

Nuclei Templates (1)

XWiki XML View - Sensitive Information Exposure
HIGHVERIFIEDby ritikchaddha
Shodan: html:"data-xwiki-reference"
FOFA: body="data-xwiki-reference"

Scores

CVSS v3 6.5
EPSS 0.0056
EPSS Percentile 68.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2025-09-06
CWE
CWE-359
Status published
Products (3)
org.xwiki.platform/xwiki-platform-legacy-oldcore 1.1 - 16.4.7Maven
org.xwiki.platform/xwiki-platform-oldcore 1.1 - 16.4.7Maven
xwiki/xwiki 1.1 - 16.4.7
Published Aug 06, 2025
Tracked Since Feb 18, 2026