// For flags

CVE-2025-49584

XWiki makes title of inaccessible pages available through the class property values REST API

Severity Score

8.7
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

XWiki is a generic wiki platform. In XWiki Platform versions 10.9 through 16.4.6, 16.5.0-rc-1 through 16.10.2, and 17.0.0-rc-1, the title of every single page whose reference is known can be accessed through the REST API as long as an XClass with a page property is accessible, this is the default for an XWiki installation. This allows an attacker to get titles of pages whose reference is known, one title per request. This doesn't affect fully private wikis as the REST endpoint checks access rights on the XClass definition. The impact on confidentiality depends on the strategy for page names. By default, page names match the title, so the impact should be low but if page names are intentionally obfuscated because the titles are sensitive, the impact could be high. This has been fixed in XWiki 16.4.7, 16.10.3 and 17.0.0 by adding access control checks before getting the title of any page.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
None
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
High
None
Integrity
None
None
Availability
None
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2025-06-06 CVE Reserved
  • 2025-06-13 CVE Published
  • 2025-06-13 CVE Updated
  • 2025-06-19 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-201: Insertion of Sensitive Information Into Sent Data
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Xwiki
Search vendor "Xwiki"
Xwiki-platform
Search vendor "Xwiki" for product "Xwiki-platform"
>= 10.9.0 < 16.4.7
Search vendor "Xwiki" for product "Xwiki-platform" and version " >= 10.9.0 < 16.4.7"
en
Affected
Xwiki
Search vendor "Xwiki"
Xwiki-platform
Search vendor "Xwiki" for product "Xwiki-platform"
>= 16.5.0 < 16.10.3
Search vendor "Xwiki" for product "Xwiki-platform" and version " >= 16.5.0 < 16.10.3"
en
Affected
Xwiki
Search vendor "Xwiki"
Xwiki-platform
Search vendor "Xwiki" for product "Xwiki-platform"
17.0.0
Search vendor "Xwiki" for product "Xwiki-platform" and version "17.0.0"
en
Affected