{"id":62580,"date":"2025-04-08T20:44:22","date_gmt":"2025-04-08T17:14:22","guid":{"rendered":"https:\/\/afaghhosting.net\/blog\/xwiki-platform-15-10-10-remote-code-execution\/"},"modified":"2025-04-08T20:44:22","modified_gmt":"2025-04-08T17:14:22","slug":"xwiki-platform-15-10-10-remote-code-execution","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/xwiki-platform-15-10-10-remote-code-execution\/","title":{"rendered":"XWiki Platform 15.10.10 &#8211; Remote Code Execution"},"content":{"rendered":"<p><\/p>\n<div>\n<pre><code class=\"language-txt\" style=\"white-space: pre-wrap;\"># Exploit Title: XWiki Platform - Remote Code Execution&#13;\n# Exploit Author: Al Baradi Joy&#13;\n# Exploit Date: April 6, 2025&#13;\n# CVE ID: CVE-2025-24893&#13;\n# Vendor Homepage: https:\/\/www.xwiki.org\/&#13;\n# Software Link: https:\/\/github.com\/xwiki\/xwiki-platform&#13;\n# Version: Affected versions up to and including XWiki 15.10.10&#13;\n# Tested Versions: XWiki 15.10.10&#13;\n# Vulnerability Type: Remote Code Execution (RCE)&#13;\n# CVSS Score: 9.8 (Critical)&#13;\n# CVSS Vector: CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H&#13;\n# Description:&#13;\n# XWiki Platform suffers from a critical vulnerability where any guest user&#13;\ncan&#13;\n# execute arbitrary code remotely through the SolrSearch endpoint. This can&#13;\nlead&#13;\n# to a full server compromise, including the ability to execute commands on&#13;\nthe&#13;\n# underlying system. The vulnerability impacts the confidentiality,&#13;\nintegrity,&#13;\n# and availability of the XWiki installation. The issue has been patched in&#13;\nXWiki&#13;\n# versions 15.10.11, 16.4.1, and 16.5.0RC1.&#13;\n# Proof of Concept: Yes&#13;\n# Categories: XWiki, Remote Code Execution, CVE-2025, RCE&#13;\n# References:&#13;\n# - GHSA Advisory: https:\/\/github.com\/advisories\/GHSA-rr6p-3pfg-562j&#13;\n# - NVD CVE Details: https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24893&#13;\n# - GitHub Exploit Link:&#13;\nhttps:\/\/github.com\/a1baradi\/Exploit\/blob\/main\/CVE-2025-24893.py&#13;\n&#13;\nimport requests&#13;\n&#13;\n# Banner&#13;\ndef display_banner():&#13;\nprint(\"=\"*80)&#13;\nprint(\"Exploit Title: CVE-2025-24893 - XWiki Platform Remote Code&#13;\nExecution\")&#13;\nprint(\"Exploit Author: Al Baradi Joy\")&#13;\nprint(\"GitHub Exploit:&#13;\nhttps:\/\/github.com\/a1baradi\/Exploit\/blob\/main\/CVE-2025-24893.py\")&#13;\nprint(\"=\"*80)&#13;\n&#13;\n# Function to detect the target protocol (HTTP or HTTPS)&#13;\ndef detect_protocol(domain):&#13;\nhttps_url = f\"https:\/\/{domain}\"&#13;\nhttp_url = f\"http:\/\/{domain}\"&#13;\n&#13;\ntry:&#13;\nresponse = requests.get(https_url, timeout=5, allow_redirects=True)&#13;\nif response.status_code <\/code><\/pre>\n<\/p><\/div>\n<p><a href=\"https:\/\/afaghhosting.net]\">\u0622\u0641\u0627\u0642 \u0647\u0627\u0633\u062a\u06cc\u0646\u06af \u0645\u062f\u06cc\u0631\u06cc\u062a \u0633\u0631\u0648\u0631 \u0645\u0634\u0627\u0648\u0631 \u0648 \u067e\u0634\u062a\u06cc\u0628\u0627\u0646 \u0641\u0646\u06cc <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p># Exploit Title: XWiki Platform &#8211; Remote Code Execution&#13; # Exploit Author: Al Baradi Joy&#13; # Exploit Date: April 6, 2025&#13; # CVE ID: CVE-2025-24893&#13; # Vendor Homepage: https:\/\/www.xwiki.org\/&#13; # Software Link: https:\/\/github.com\/xwiki\/xwiki-platform&#13; # Version: Affected versions up to and including XWiki 15.10.10&#13; # Tested Versions: XWiki 15.10.10&#13; # Vulnerability Type: Remote Code Execution (RCE)&#13; &hellip;<\/p>\n","protected":false},"author":1,"featured_media":62562,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-62580","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/62580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=62580"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/62580\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media\/62562"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=62580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=62580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=62580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}