First published: Wed Apr 16 2025(Updated: )
### Impact This vulnerability impacts users of a subwiki of XWiki where Message Stream is enabled and use, if they configured their wiki to be closed by selecting "Prevent unregistered users to view pages" in the Administrations Rights. The vulnerability is that any message sent in a subwiki to "everyone" is actually sent to the farm: any visitor of the main wiki will be able to see that message through the Dashboard, even if the subwiki is configured to be private. ### Patches This problem has not been patched and is not going to be patched in the future: Message Stream has been deprecated in XWiki 16.8.0RC1 and is not maintained anymore. ### Workarounds Message Stream is disabled by default, it's advised to keep it disabled from Administration > Social > Message Stream. ### References * https://jira.xwiki.org/browse/XWIKI-17154
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.xwiki.platform:xwiki-platform-messagestream | >=5.0<=16.7.1 | |
Xwiki | >=5.0<=16.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-32783 is considered a medium severity vulnerability that can expose sensitive information in a closed XWiki subwiki.
To fix CVE-2025-32783, update to a version of org.xwiki.platform:xwiki-platform-messagestream greater than 16.7.1.
CVE-2025-32783 affects users of XWiki subwikis that have the Message Stream enabled and have restricted access settings.
Exploitation of CVE-2025-32783 can allow unregistered users to access messages in a subwiki, compromising the privacy of that information.
Yes, CVE-2025-32783 affects the org.xwiki.platform:xwiki-platform-messagestream versions from 5.0 to 16.7.1.