Loading HuntDB...

CVE-2025-49584

UNKNOWN
Published 2025-06-13T17:21:33.575Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-49584. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

XWiki is a generic wiki platform. In XWiki Platform versions 10.9 through 16.4.6, 16.5.0-rc-1 through 16.10.2, and 17.0.0-rc-1, the title of every single page whose reference is known can be accessed through the REST API as long as an XClass with a page property is accessible, this is the default for an XWiki installation. This allows an attacker to get titles of pages whose reference is known, one title per request. This doesn't affect fully private wikis as the REST endpoint checks access rights on the XClass definition. The impact on confidentiality depends on the strategy for page names. By default, page names match the title, so the impact should be low but if page names are intentionally obfuscated because the titles are sensitive, the impact could be high. This has been fixed in XWiki 16.4.7, 16.10.3 and 17.0.0 by adding access control checks before getting the title of any page.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

Not EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

XWiki makes title of inaccessible pages available through the class property values REST API

Data provided by ENISA EU Vulnerability Database. Last updated: June 13, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed HIGH

XWiki makes title of inaccessible pages available through the class property values REST API

GHSA-mvp5-qx9c-c3fv

Advisory Details

### Impact The title of every single page whose reference is known can be accessed through the REST API as long as an XClass with a page property is accessible, this is the default for an XWiki installation. This allows an attacker to get titles of pages whose reference is known, one title per request. This doesn't affect fully [private wikis](https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Access%20Rights/#HPrivateWiki) as the REST endpoint checks access rights on the XClass definition. The impact on confidentiality depends on the strategy for page names. By default, page names match the title, so the impact should be low but if page names are intentionally obfuscated because the titles are sensitive, the impact could be high. ### Patches This has been fixed in XWiki 16.4.7, 16.10.3 and 17.0.0 by adding access control checks before getting the title of any page. ### Workarounds We're not aware of any workarounds.

Affected Packages

Maven org.xwiki.platform:xwiki-platform-rest-server
ECOSYSTEM: ≥10.9 <16.4.7
Maven org.xwiki.platform:xwiki-platform-rest-server
ECOSYSTEM: ≥16.5.0-rc-1 <16.10.3
Maven org.xwiki.platform:xwiki-platform-rest-server
ECOSYSTEM: ≥17.0.0-rc-1 <17.0.0

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Advisory provided by GitHub Security Advisory Database. Published: June 13, 2025, Modified: June 13, 2025

References

Published: 2025-06-13T17:21:33.575Z
Last Modified: 2025-06-13T18:20:04.000Z
Copied to clipboard!