CVE-2022-41935
Java vulnerability analysis and mitigation

Overview

XWiki Platform, a generic wiki platform offering runtime services for applications, was found to contain a sensitive information exposure vulnerability (CVE-2022-41935). The vulnerability was discovered in July 2022 and affected versions >= 12.10.11, >= 13.9-rc-1, and >= 13.4.4. The issue was patched in versions 14.6-rc-1, 13.10.8, and 14.4.3. This vulnerability allowed users without proper view permissions to deduce the existence and content of documents they shouldn't have access to (XWiki Advisory).

Technical details

The vulnerability exists in the LiveTable feature where users without view rights could perform repeated queries to discover information about restricted documents. The issue has a CVSS v3.1 score of 5.3 (Moderate) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N. The vulnerability is classified as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). Through carefully crafted queries to the LiveTable results endpoint, an attacker could iteratively discover document content by using binary search techniques (XWiki Advisory).

Impact

The vulnerability allows unauthorized users to discover the existence and content of documents they don't have permission to view. Using binary search techniques, attackers could reconstruct title, content, and object fields of inaccessible documents. For a known alphabet of less than 128 characters, discovering a single character could be achieved with just 7 requests. The attack could be optimized using word frequency analysis to guess whole words, making content recovery potentially faster (XWiki Advisory).

Mitigation and workarounds

The issue has been patched in XWiki versions 14.6RC1, 13.10.8, and 14.4.3. For affected versions (>= 12.10.11, >= 13.9-rc-1, and >= 13.4.4), users can manually apply the patch to the XWiki.LiveTableResultsMacros document or import a XAR archive of a patched version (XWiki Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55749HIGH8.7
  • JavaJava
  • org.xwiki.platform:xwiki-platform-tool-jetty-resources
NoYesDec 01, 2025
CVE-2025-13806MEDIUM6.9
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-13805MEDIUM6.3
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-13804MEDIUM5.3
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-66372LOW2.8
  • JavaJava
  • org.mustangproject:library
NoYesNov 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management