CVE-2025-49584
Java vulnerability analysis and mitigation

Overview

CVE-2025-49584 affects XWiki Platform versions 10.9 through 16.4.6, 16.5.0-rc-1 through 16.10.2, and 17.0.0-rc-1. The vulnerability was discovered on December 17, 2024, and publicly disclosed on June 13, 2025. The issue allows unauthorized access to page titles through the REST API when an XClass with a page property is accessible, which is the default configuration for an XWiki installation (GitHub Advisory).

Technical details

The vulnerability exists in the REST API's class property values functionality. When a page reference is known, an attacker can access the title of that page through the REST API endpoint, even without proper view permissions. This is possible as long as there is an accessible XClass with a page property. The vulnerability has been assigned a CVSS v4.0 base score of 8.7 (High) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N, indicating it can be exploited remotely with no special requirements (GitHub Advisory).

Impact

The impact severity depends on the page naming strategy used in the XWiki installation. In default configurations where page names match their titles, the impact is considered low. However, in cases where page names are intentionally obfuscated because titles contain sensitive information, the impact could be high. The vulnerability does not affect fully private wikis as the REST endpoint checks access rights on the XClass definition (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in XWiki versions 16.4.7, 16.10.3, and 17.0.0 by implementing proper access control checks before retrieving any page title. The fix involves adding view right verification before rendering titles. No workarounds are available for affected versions, making upgrading to a patched version the only solution (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66516CRITICAL10
  • JavaJava
  • tika
NoYesDec 04, 2025
CVE-2025-66566HIGH8.2
  • JavaJava
  • org.lz4:lz4-java
NoYesDec 05, 2025
CVE-2025-66623HIGH7.4
  • JavaJava
  • io.strimzi:strimzi
NoYesDec 05, 2025
CVE-2025-11222MEDIUM6.1
  • JavaJava
  • com.linecorp.centraldogma:centraldogma-server-auth-shiro
NoYesDec 04, 2025
CVE-2025-66453MEDIUM5.5
  • JavaJava
  • org.mozilla:rhino
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management