fkie_cve-2025-51991
Vulnerability from fkie_nvd
Published
2025-08-20 15:15
Modified
2025-09-11 13:50
Severity ?
Summary
XWiki through version 17.3.0 is vulnerable to Server-Side Template Injection (SSTI) in the Administration interface, specifically within the HTTP Meta Info field of the Global Preferences Presentation section. An authenticated administrator can inject crafted Apache Velocity template code, which is rendered on the server side without proper validation or sandboxing. This enables the execution of arbitrary template logic, which may expose internal server information or, in specific configurations, lead to further exploitation such as remote code execution or sensitive data leakage. The vulnerability resides in improper handling of dynamic template rendering within user-supplied configuration fields.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/malcxlmj/cve-writeups/blob/main/CVE-2025-51991.md | Third Party Advisory, Exploit | |
| cve@mitre.org | https://xwiki.org | Product |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"matchCriteriaId": "299B1520-4DFC-4D21-A589-ECE23F2AAF60",
"versionEndIncluding": "17.3.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "XWiki through version 17.3.0 is vulnerable to Server-Side Template Injection (SSTI) in the Administration interface, specifically within the HTTP Meta Info field of the Global Preferences Presentation section. An authenticated administrator can inject crafted Apache Velocity template code, which is rendered on the server side without proper validation or sandboxing. This enables the execution of arbitrary template logic, which may expose internal server information or, in specific configurations, lead to further exploitation such as remote code execution or sensitive data leakage. The vulnerability resides in improper handling of dynamic template rendering within user-supplied configuration fields."
},
{
"lang": "es",
"value": "XWiki, hasta la versi\u00f3n 17.3.0, es vulnerable a Server-Side Template Injection (SSTI) en la interfaz de Administraci\u00f3n, espec\u00edficamente en el campo HTTP Meta Info de la secci\u00f3n Presentaci\u00f3n de Preferencias Globales. Un administrador autenticado puede inyectar c\u00f3digo de plantilla Apache Velocity manipulado, el cual se procesa en el servidor sin la validaci\u00f3n ni el entorno de pruebas adecuados. Esto permite la ejecuci\u00f3n de l\u00f3gica de plantilla arbitraria, lo que puede exponer informaci\u00f3n interna del servidor o, en ciertas configuraciones, provocar una explotaci\u00f3n posterior, como la ejecuci\u00f3n remota de c\u00f3digo o la filtraci\u00f3n de datos confidenciales. La vulnerabilidad reside en el manejo inadecuado de la renderizaci\u00f3n din\u00e1mica de plantillas dentro de los campos de configuraci\u00f3n proporcionados por el usuario."
}
],
"id": "CVE-2025-51991",
"lastModified": "2025-09-11T13:50:55.417",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-08-20T15:15:33.327",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit"
],
"url": "https://github.com/malcxlmj/cve-writeups/blob/main/CVE-2025-51991.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://xwiki.org"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…