Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-65091 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SQL Injection in XWiki Full Calendar Macro. <br>πŸ’₯ **Consequences**: Attackers can access sensitive database info or trigger Denial of Service (DoS). Critical integrity/availability loss.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-89**: Improper Neutralization of Special Elements used in an SQL Command. <br>πŸ” **Flaw**: User input in the Calendar.JSONService is not sanitized before database execution.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Product**: XWiki Full Calendar Macro (`macro-fullcalendar`). <br>πŸ“‰ **Affected**: Versions **prior to 2.4.5**. <br>🏒 **Vendor**: xwiki-contrib.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Data Access**: Read arbitrary database contents. <br>πŸ’£ **DoS**: Crash or overload the service. <br>πŸ”“ **Privilege**: Requires only 'View Calendar.JSONService' permission.

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold: LOW**. <br>πŸ”‘ **Auth**: No authentication required for the specific endpoint if view permission exists (often public or low-barrier). <br>🌐 **Network**: Remote (AV:N). <br>🎯 **Complexity**: Low (AC:L).

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: None currently listed in the data. <br>πŸ“ **Status**: PoCs are empty in the provided dataset. <br>⚠️ **Risk**: High CVSS score suggests easy exploitation logic, even without public code.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for `macro-fullcalendar` version < 2.4.5. <br>🌐 **Target**: Look for `Calendar.JSONService` endpoints. <br>πŸ“‘ **Tools**: Use SQL injection scanners against calendar-related API paths.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. <br>πŸ”§ **Patch**: Upgrade to **version 2.4.5** or later. <br>πŸ”— **Ref**: GitHub Advisory GHSA-2g22-wg49-fgv5 & Commit 5fdcf06.

Q9What if no patch? (Workaround)

πŸ›‘ **Workaround**: Disable the Full Calendar Macro if not needed. <br>🚧 **Network**: Restrict access to `Calendar.JSONService` via WAF or firewall rules.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority: CRITICAL**. <br>πŸ“Š **CVSS**: 9.8 (High). <br>πŸš€ **Action**: Patch immediately. Remote, unauthenticated (or low-priv) SQLi is a top-tier threat.