Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-24893 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Unauthenticated Remote Code Execution (RCE) in XWiki Platform via `SolrSearch`. πŸ’₯ **Consequences**: Complete system compromise.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-95 (Improper Neutralization of Special Elements in Code). The `SolrSearchMacros` component fails to properly sanitize user input, allowing template injection that leads to code execution.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected Versions**: β€’ XWiki Platform >= 5.3-milestone-2, < 15.10.11 β€’ XWiki Platform >= 16.0.0-rc-1, < 16.4.1 β€’ All versions prior to the fixed releases listed above.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: As an unauthenticated guest, you can run **any** system command. This includes reading sensitive files, stealing database credentials, installing backdoors, or pivoting to internal networks.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Exploitation Threshold**: **EXTREMELY LOW**. β€’ **Auth**: None required (Guest/Anonymous). β€’ **UI**: None required (No user interaction). β€’ **Network**: Remote (AV:N). β€’ **Complexity**: Low (AC:L).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exploits**: **YES**. Multiple PoCs and full exploits are available on GitHub (e.g., `CVE-2025-24893.py`). Automated scanning templates (Nuclei) are also public. Wild exploitation is highly likely.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Use Nuclei template: `CVE-2025-24893.yaml`. 2. Check if your XWiki version is in the affected range. 3. Look for the `SolrSearch` endpoint being accessible without authentication.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **YES**. Patched in: β€’ **15.10.11** β€’ **16.4.1** β€’ **16.5.0RC1** Update immediately to these versions or later.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: 1. **Block Access**: Restrict access to the `SolrSearch` endpoint via WAF or firewall rules. 2. **Disable Solr**: If not needed, disable the Solr search module. 3.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL (P0)**. CVSS 10.0 + Unauthenticated RCE + Public Exploits = Immediate action required. Patch within 24-48 hours or isolate the service.