First published: Wed Apr 30 2025(Updated: )
### Impact Anyone can access the metadata of any attachment in the wiki using the wiki attachment REST endpoint. It's not filtering the result depending on current user rights, a not authenticated user could exploit this even in a totally private wiki. To reproduce: * remove view from guest on the whole wiki * logout * access http://127.0.0.1:8080/xwiki/rest/wikis/xwiki/attachments You get a list of attachments, while the expected result should be an empty list. ### Patches This vulnerability has been fixed in XWiki 14.10.22, 15.10.12, 16.7.0-rc-1 and 16.4.3. ### Workarounds We're not aware of any workaround except upgrading. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution Issue reported by Lukas Monert.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.xwiki.platform:xwiki-platform-rest-server | >=16.5.0-rc-1<16.7.0 | 16.7.0 |
maven/org.xwiki.platform:xwiki-platform-rest-server | >=16.0.0-rc-1<16.4.3 | 16.4.3 |
maven/org.xwiki.platform:xwiki-platform-rest-server | >=15.0-rc-1<15.10.12 | 15.10.12 |
maven/org.xwiki.platform:xwiki-platform-rest-server | >=1.8.1<14.10.22 | 14.10.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-46554 has been classified as a high-severity vulnerability due to unauthorized access to sensitive metadata.
To fix CVE-2025-46554, upgrade to the patched versions of the 'org.xwiki.platform:xwiki-platform-rest-server' package as specified in the advisory.
Vulnerable versions of the software include 'org.xwiki.platform:xwiki-platform-rest-server' from 15.0-rc-1 to 16.7.0 and between 1.8.1 to 14.10.22.
CVE-2025-46554 can be exploited by any user, even unauthenticated users, who can access the REST endpoint.
If you cannot upgrade, consider implementing additional access controls to limit access to the wiki attachment REST endpoint.