CVE-2025-29925 Scanner

CVE-2025-29925 Scanner - Information Disclosure vulnerability in XWiki

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

11 days 19 hours

Scan only one

URL

Toolbox

-

XWiki is an open-source platform primarily used for collaborating and creating knowledge management solutions. It is popular among businesses and educational institutions for documentation and information management. Developed in Java, XWiki can serve as a powerful tool for customizing and extending enterprise applications. The software's REST API facilitates seamless interaction with XWiki data, allowing for extensive integrations. Users employ XWiki for managing team projects, documenting processes, and sharing knowledge across varied domains. Its extensibility and flexibility make it a preferred choice for organizations seeking customizable knowledge management solutions.

The Information Disclosure vulnerability in XWiki's REST API allows unauthorized access to private pages. This flaw resides in the API's pages endpoint, which can inadvertently expose sensitive information. As unauthenticated users can exploit this vulnerability, it poses a significant risk to data confidentiality. The issue is concerning for organizations as it can lead to unintended leaks of private page metadata. By exploiting this flaw, attackers could gather intelligence that might otherwise be restricted. Addressing this vulnerability is crucial to safeguard sensitive information from unauthorized access.

The vulnerability arises due to inadequate access control mechanisms in XWiki's REST API. Specifically, the endpoint intended for page retrieval fails to enforce proper authentication checks. Technical details reveal that endpoints like /rest/wikis/xwiki/pages?space= can be queried to uncover private page information. This loophole allows unauthorized parties to invoke the API and retrieve page summaries, metadata, and related elements. Security assessments should focus on the API responses, ensuring they don't include unauthorized data. The vulnerable paths must be audited and corrected to prevent exposure of restricted information.

Exploiting this vulnerability can lead to the unauthorized disclosure of sensitive private page details. Malicious actors capable of accessing this data might use it for reconnaissance or crafting targeted attacks. Businesses could suffer from information leaks, damaging their reputation and leading to a loss of competitive advantage. The lack of stringent access control might also mean potential violations of data protection regulations. The exposure also increases the risk of social engineering, where private information about internal processes could be misused. Ultimately, this vulnerability underscores the need for rigorous security controls on API endpoints to maintain data confidentiality.

REFERENCES

Get started to protecting your digital assets