Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| xwiki | xwiki-platform | >= 1.8.1, < 14.10.22 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A vulnerability in XWiki's REST API allows unauthenticated users to access attachments list and metadata through the attachments endpoint. This could lead to disclosure of sensitive information stored in attachments metadata. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-46554.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-32973 | 9.1 CRITICAL | org.xwiki.platform:xwiki-platform-component-wiki provides no warning when granting XWiki.C |
| CVE-2025-32974 | 9.1 CRITICAL | org.xwiki.platform:xwiki-platform-security-requiredrights-default required rights analysis |
| CVE-2025-32970 | 6.1 MEDIUM | org.xwiki.platform:xwiki-platform-wysiwyg-api Open Redirect vulnerability |
| CVE-2025-32971 | 3.8 LOW | XWiki Solr script service doesn't take dropped programming right into account |
| CVE-2025-32972 | 2.7 LOW | The lesscss script service allows cache clearing without programming right |
| CVE-2025-46557 | Any user with view access to the XWiki space can change the authenticator |
No comments yet