CVE-2025-55730

XWiki · XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Multiple Products

A critical vulnerability has been identified in the XWiki Remote Macros extension, assigned a maximum severity score of 10.0.

Executive summary

A critical vulnerability has been identified in the XWiki Remote Macros extension, assigned a maximum severity score of 10.0. This flaw allows an unauthenticated, remote attacker to execute arbitrary code on the server by submitting a specially crafted macro, leading to a complete system compromise. Organizations using the affected software are at immediate risk of data theft, service disruption, and further network intrusion.

Vulnerability

The vulnerability exists due to improper input validation and a lack of output escaping in the component that processes macro titles. An unauthenticated remote attacker can inject malicious code, likely using a scripting language payload (e.g., Velocity, Groovy), into the title parameter of a remote macro. When the XWiki server renders this macro, the injected code is executed with the full privileges of the XWiki application, resulting in Remote Code Execution (RCE) on the underlying server.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 10.0, representing the highest possible risk. Successful exploitation grants an attacker complete control over the affected XWiki server, compromising the confidentiality, integrity, and availability of all data it hosts. Potential consequences include theft of sensitive corporate data, intellectual property, or user credentials; manipulation or deletion of critical information; and complete service outages. A compromised server could also be used as a pivot point to launch further attacks against the internal network, significantly expanding the scope of the breach.

Remediation

Immediate Action: Immediately update the "XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Multiple Products" extension to version 1.26.5 or a later version. After patching, it is crucial to monitor for any signs of ongoing exploitation and review historical access logs for indicators of compromise that may have occurred prior to the update.

Proactive Monitoring: Security teams should actively monitor for signs of exploitation. Review application and web server logs for unusual or malformed requests targeting macro functionality. Monitor system activity for suspicious processes spawned by the XWiki service's user account (e.g., sh, bash, powershell, curl, wget). Implement network monitoring to detect unexpected outbound connections from the XWiki server, which could indicate data exfiltration or command-and-control communication.

Compensating Controls: If immediate patching is not feasible, consider the following mitigating actions:

  • If possible, temporarily disable the Remote Macros functionality entirely.
  • Implement a Web Application Firewall (WAF) with rules specifically designed to block common script injection and command injection patterns in HTTP requests related to macro titles.
  • Enforce strict network egress filtering on the server hosting XWiki to prevent it from establishing unauthorized outbound connections to the internet.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Given the critical CVSS score of 10.0 and the availability of a public exploit, immediate and decisive action is required. We strongly recommend that all organizations using the affected XWiki Remote Macros extension apply the vendor-supplied patch without delay. This vulnerability should be treated as an active threat. After patching, organizations must perform a thorough investigation to search for any evidence of prior compromise. Due to the high risk of exploitation, this remediation effort should be considered the highest priority for security and IT teams.