S4E

CVE-2025-32429 Scanner

CVE-2025-32429 Scanner - SQL Injection (SQLi) vulnerability in XWiki Platform

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

22 days 18 hours

Scan only one

URL

Toolbox

XWiki Platform is a generic wiki platform that is widely used for creating dynamic and flexible applications. It is utilized by developers and businesses to build custom wikis and collaborative projects. The platform provides runtime services and is known for its extensibility, allowing for the integration of numerous add-ons and plugins. XWiki promotes community collaboration and is often used in enterprises for sharing knowledge and documentation. Known for its adaptability, XWiki is an open-source solution that empowers users to tailor their wikis to specific organizational needs. It is a robust solution in environments that require efficient management of documentation and collaborative working spaces.

The vulnerability detected is an SQL Injection, which can have severe consequences if exploited. SQL Injection involves inserting or "injecting" SQL queries through the input data from the client to the application. This defect in XWiki Platform versions 9.4-rc-1 through 16.10.5 and 17.0.0-rc-1 through 17.2.2 enables attackers to inject SQL queries via the sort parameter. If leveraged, this could lead to data leakage, unauthorized database modifications, or even full compromise of the application. The vulnerability is particularly critical as it does not require authentication for exploitation.

Technically, the vulnerability exists in the sort parameter within the getdeleteddocuments.vm template. Exploiting this, an attack can inject SQL queries in the order by clause. This defect can trigger exceptions within the application, particularly noted by the presence of LiveDataException errors. Furthermore, the injected code can be used to manipulate database operations due to the improper validation and sanitization of fields within the application.

Exploitation of this vulnerability could lead to unauthorized access to sensitive data, modification or deletion of database entries, and potential compromise of other interconnected systems. In a worst-case scenario, attackers could gain further entry into the network or pivot to other systems, endangering the entire application environment. They could extract confidential information, disrupt services, and potentially execute commands on the server if not protected.

REFERENCES

Get started to protecting your digital assets