CVE-2025-49580
Java vulnerability analysis and mitigation

Overview

CVE-2025-49580 is a privilege escalation vulnerability discovered in XWiki, a generic wiki platform. The vulnerability affects versions from 8.2 and 7.4.5 until 17.1.0-rc-1, 16.10.4, and 16.4.7, and was disclosed on June 13, 2025. The issue allows pages to gain unauthorized script or programming rights when they contain a link and the target of the link is renamed or moved (GitHub Advisory, NVD).

Technical details

The vulnerability stems from a privilege handling issue in the link refactoring operations. When links are modified during refactoring operations (e.g., page rename), the document is saved using the current author as metadata author, which can lead to privilege escalation. The vulnerability has been assigned a CVSS v4.0 base score of 8.5 (High), with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N. The issue is classified as CWE-266 (Incorrect Privilege Assignment) (GitHub Advisory, Wiz).

Impact

The vulnerability can lead to the execution of scripts contained in xobjects that should have never been executed. This could result in unauthorized script execution with elevated privileges, potentially compromising the confidentiality, integrity, and availability of the system. The attack might enable execution of any script, leading to potential system compromise (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in XWiki versions 16.4.7, 17.1.0-rc-1, and 16.10.4. The fix involves only setting the originalMetadataAuthor when performing such changes, ensuring it's displayed in the history without impacting right evaluation. If upgrading is not possible, administrators can apply the patch to the xwiki-platform-refactoring-default module specifically. The only workaround without patching is to prevent users from performing any refactoring operations with users having more than edit rights (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14306CRITICAL10
  • JavaJava
  • net.sf.robocode:robocode.core
NoYesDec 09, 2025
CVE-2025-14307CRITICAL9.3
  • JavaJava
  • net.sf.robocode:robocode.battle
NoYesDec 09, 2025
CVE-2025-66566HIGH8.2
  • JavaJava
  • at.yawk.lz4:lz4-java
NoYesDec 05, 2025
CVE-2025-66623HIGH7.4
  • JavaJava
  • io.strimzi:strimzi
NoYesDec 05, 2025
GHSA-93fv-4pm9-xp28MEDIUM6.9
  • JavaJava
  • net.dv8tion:jda
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management