CVE-2025-54125
Java vulnerability analysis and mitigation

Overview

CVE-2025-54125 affects XWiki Platform, a generic wiki platform offering runtime services for applications. The vulnerability exists in versions 1.1 through 16.4.6, 16.5.0-rc-1 through 16.10.4, and 17.0.0-rc-1 through 17.1.0. The issue allows any user with view rights to access password and email properties stored in documents by appending ?xpage=xml to the URL, even when these properties aren't explicitly named 'password' or 'email'. This vulnerability was discovered in January 2025 and patched in versions 16.4.7, 16.10.5, and 17.2.0-rc-1 (GitHub Advisory).

Technical details

The vulnerability is classified as High severity with a CVSS v4.0 base score of 8.7. The attack vector is Network (N) with Low (L) attack complexity, requiring No (N) privileges or user interaction. The vulnerability stems from improper filtering of sensitive fields in the XML export functionality, which only filters properties explicitly named 'password' and 'email' but fails to protect similarly sensitive fields with different names. This exposure occurs when accessing a page's XML view through the ?xpage=xml URL parameter (GitHub Advisory, NVD).

Impact

The vulnerability primarily exposes salted and hashed user account validation tokens and password reset tokens. While these tokens are randomly generated strings, making the immediate impact relatively low, the risk increases significantly if the wiki contains extensions or custom code that store passwords in plain text in such properties. The exposure of email properties could also lead to unauthorized access to users' contact information (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in XWiki Platform versions 16.4.7, 16.10.5, and 17.2.0-rc-1. For users unable to update immediately, a workaround exists: the file templates/xml.vm in the deployed WAR can be deleted if the XML export functionality isn't needed. It's noted that no feature in XWiki itself depends on this XML export (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68931HIGH8.7
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026
CVE-2025-68703HIGH8.7
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026
CVE-2025-68704HIGH8.2
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026
CVE-2025-66169MEDIUM6.9
  • JavaJava
  • org.apache.camel:camel-neo4j
NoYesJan 14, 2026
CVE-2025-68925MEDIUM6.9
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management