First published: Wed Mar 19 2025(Updated: )
XWiki Platform is a generic wiki platform. Prior to 15.10.15, 16.4.6, and 16.10.0, any user can exploit the WikiManager REST API to create a new wiki, where the user could become an administrator and so performs other attacks on the farm. Note that this REST API is not bundled in XWiki Standard by default: it needs to be installed manually through the extension manager. The problem has been patched in versions 15.10.15, 16.4.6 and 16.10.0 of the REST module.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
XWiki Platform | <15.10.15<16.4.6<16.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-29926 is considered a high-severity vulnerability as it allows unauthorized users to create wikis and gain administrative access.
To fix CVE-2025-29926, upgrade to XWiki Platform versions 15.10.15, 16.4.6, or 16.10.0 or later.
CVE-2025-29926 affects all versions of XWiki Platform prior to 15.10.15, 16.4.6, and 16.10.0.
Due to CVE-2025-29926, attackers can create new wikis and escalate privileges, potentially leading to further attacks on the wiki platform.
Yes, the WikiManager REST API is specifically the vector that allows exploitation in CVE-2025-29926.