S4E

CVE-2025-51990 Scanner

CVE-2025-51990 Scanner - Cross-Site Scripting (XSS) vulnerability in XWiki

Short Info


Level

Medium

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

24 days 3 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

XWiki is a popular open-source wiki platform used by organizations worldwide to create and manage collaborative workspaces. It serves as a comprehensive content management system allowing users to create, edit, and organize content efficiently. Companies, universities, and communities use XWiki for its flexibility and extensive feature set that includes user management, document sharing, and a powerful extension ecosystem. The software supports a wide range of use cases, from simple knowledge bases to complex enterprise portals. Users appreciate XWiki for its customizable interface and robust security features. Its open-source nature allows for community-driven improvements and adaptations.

Cross-Site Scripting (XSS) is a vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. In the case of XWiki, this vulnerability is found in the Administration interface's Presentation section. Improper input sanitization lets authenticated administrators execute JavaScript in visitors' browsers. This type of attack can lead to session hijacking, credential theft, and unauthorized actions without the user's interaction. It is crucial to be aware of such vulnerabilities to maintain the integrity and security of web services. Regular updates and security checks are essential to mitigate such threats.

XWiki's vulnerability is technically rooted in the Administration interface's Presentation section. The flaw arises from improper sanitization of inputs, which allows malicious JavaScript to be injected. This can be exploited by authenticated administrators to execute persistent scripts in users' browsers. The endpoint involved is the XWikiPreferences save function, which handles user preferences and presentation settings. A vulnerable parameter in this endpoint fails to correctly sanitize input, allowing script tags to be injected. Successful exploitation depends on manipulating the HTML content of the page viewed by other users.

When exploited, the Cross-Site Scripting vulnerability in XWiki can have several significant consequences. Attacker-controlled scripts can perform malicious actions such as stealing user session data or credentials. Users might unknowingly execute unauthorized actions or have their personal information compromised. This vulnerability poses a risk to data confidentiality and integrity. It can also damage the trust and reputation of organizations using XWiki for their operations. Severity of the impact depends on how the injected script interacts with the user's browser environment and session.

REFERENCES

Get started to protecting your digital assets