CVE-2025-66474

XWiki Rendering is a generic rendering system that converts textual input in a given syntax (wiki syntax, HTML, etc) into another syntax (XHTML, etc). Versions 16.10.9 and below, 17.0.0-rc-1 through 17.4.2 and 17.5.0-rc-1 through 17.5.0 have insufficient protection against {{/html}} injection, which attackers can exploit through RCE. Any user who can edit their own profile or any other document can execute arbitrary script macros, including Groovy and Python macros, which enable remote code execution as well as unrestricted read and write access to all wiki contents. This issue is fixed in versions 16.10.10, 17.4.3 and 17.6.0-rc-1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xwiki:xwiki-rendering:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki-rendering:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki-rendering:17.5.0:-:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki-rendering:17.5.0:rc1:*:*:*:*:*:*

History

19 Dec 2025, 17:13

Type Values Removed Values Added
First Time Xwiki
Xwiki xwiki-rendering
CWE CWE-94
CPE cpe:2.3:a:xwiki:xwiki-rendering:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki-rendering:17.5.0:-:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki-rendering:17.5.0:rc1:*:*:*:*:*:*
References () https://github.com/xwiki/xwiki-platform/commit/12b780ccd5bca5fc8f74f46648d7e02fa04fbc11 - () https://github.com/xwiki/xwiki-platform/commit/12b780ccd5bca5fc8f74f46648d7e02fa04fbc11 - Patch
References () https://github.com/xwiki/xwiki-rendering/commit/9b71a2ee035815cfc29cebbfe81dbdd98f941d49 - () https://github.com/xwiki/xwiki-rendering/commit/9b71a2ee035815cfc29cebbfe81dbdd98f941d49 - Patch
References () https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-9xc6-c2rm-f27p - () https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-9xc6-c2rm-f27p - Patch, Vendor Advisory
References () https://jira.xwiki.org/browse/XRENDERING-693 - () https://jira.xwiki.org/browse/XRENDERING-693 - Exploit, Patch, Vendor Advisory
References () https://jira.xwiki.org/browse/XRENDERING-792 - () https://jira.xwiki.org/browse/XRENDERING-792 - Exploit, Patch, Vendor Advisory
References () https://jira.xwiki.org/browse/XRENDERING-793 - () https://jira.xwiki.org/browse/XRENDERING-793 - Exploit, Patch, Vendor Advisory
References () https://jira.xwiki.org/browse/XWIKI-23378 - () https://jira.xwiki.org/browse/XWIKI-23378 - Patch, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

11 Dec 2025, 16:16

Type Values Removed Values Added
References () https://jira.xwiki.org/browse/XRENDERING-693 - () https://jira.xwiki.org/browse/XRENDERING-693 -
References () https://jira.xwiki.org/browse/XRENDERING-792 - () https://jira.xwiki.org/browse/XRENDERING-792 -
References () https://jira.xwiki.org/browse/XRENDERING-793 - () https://jira.xwiki.org/browse/XRENDERING-793 -

10 Dec 2025, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-10 22:16

Updated : 2025-12-19 17:13


NVD link : CVE-2025-66474

Mitre link : CVE-2025-66474

CVE.ORG link : CVE-2025-66474


JSON object : View

Products Affected

xwiki

  • xwiki-rendering
CWE
CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')