Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| xwiki | xwiki-platform | >= 13.5-rc-1, < 15.10.13 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A vulnerability in XWiki's WYSIWYG API allows an attacker to redirect users to arbitrary external URLs through the xerror parameter. This could be used in phishing attacks to redirect users to malicious websites. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-32970.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-32973 | 9.1 CRITICAL | org.xwiki.platform:xwiki-platform-component-wiki provides no warning when granting XWiki.C |
| CVE-2025-32974 | 9.1 CRITICAL | org.xwiki.platform:xwiki-platform-security-requiredrights-default required rights analysis |
| CVE-2025-46554 | 5.3 MEDIUM | XWiki missing authorization when accessing the wiki level attachments list and metadata vi |
| CVE-2025-32971 | 3.8 LOW | XWiki Solr script service doesn't take dropped programming right into account |
| CVE-2025-32972 | 2.7 LOW | The lesscss script service allows cache clearing without programming right |
| CVE-2025-46557 | Any user with view access to the XWiki space can change the authenticator |
No comments yet