CVE-2025-48063
Java vulnerability analysis and mitigation

Overview

XWiki, a generic wiki platform, introduced a security vulnerability (CVE-2025-48063) in version 16.10.0 related to required rights functionality. The vulnerability was discovered and disclosed on May 21, 2025, affecting versions 16.10.0-rc-1 through 16.10.4 and 17.0.0-rc-1 through 17.1.0-rc-1. The issue allows users with only edit rights to set programming rights as required rights, potentially leading to unauthorized privilege escalation (GitHub Advisory).

Technical details

The vulnerability stems from a bug in the implementation of the required rights enforcement rule. The security model was designed to prevent users from defining rights they don't possess as required rights. However, the flawed implementation allowed any user with edit rights to set programming rights as required rights on a document. When a user with programming rights subsequently edited the document, the content would gain programming rights, enabling potential remote code execution. The vulnerability has been assigned a CVSS v4.0 base score of 4.8 (Medium) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N (GitHub Advisory).

Impact

The impact of this vulnerability is considered low, despite the potential for gaining programming rights which could lead to remote code execution. This assessment is based on two factors: first, the vulnerability only provides additional attack surface if all documents in the wiki enforce required rights; second, XWiki still performs required rights analysis when a user edits a page, warning users with programming rights about dangerous content unless the attacker manages to bypass this check (GitHub Advisory, XWIKI Jira).

Mitigation and workarounds

The vulnerability has been patched in XWiki versions 16.10.4 and 17.1.0RC1. No known workarounds are available except for upgrading to these patched versions (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55749HIGH8.7
  • JavaJava
  • org.xwiki.platform:xwiki-platform-tool-jetty-resources
NoYesDec 01, 2025
CVE-2025-64775HIGH7.5
  • JavaJava
  • javapackages-tools:201801::guice-servlet
NoYesDec 01, 2025
CVE-2025-13806MEDIUM6.9
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-66453MEDIUM5.5
  • JavaJava
  • org.mozilla:rhino
NoYesDec 03, 2025
CVE-2025-13472MEDIUM5.3
  • JavaJava
  • com.blazemeter.plugins:blazemeterjenkinsplugin
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management