Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-24893
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Remote code execution as guest via SolrSearchMacros request in xwiki
Source: NVD (National Vulnerability Database)
Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any guest can perform arbitrary remote code execution through a request to `SolrSearch`. This impacts the confidentiality, integrity and availability of the whole XWiki installation. To reproduce on an instance, without being logged in, go to `<host>/xwiki/bin/get/Main/SolrSearch?media=rss&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28"Hello%20from"%20%2B%20"%20search%20text%3A"%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20`. If there is an output, and the title of the RSS feed contains `Hello from search text:42`, then the instance is vulnerable. This vulnerability has been patched in XWiki 15.10.11, 16.4.1 and 16.5.0RC1. Users are advised to upgrade. Users unable to upgrade may edit `Main.SolrSearchMacros` in `SolrSearchMacros.xml` on line 955 to match the `rawResponse` macro in `macros.vm#L2824` with a content type of `application/xml`, instead of simply outputting the content of the feed.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
动态执行代码中指令转义处理不恰当(Eval注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
XWiki Platform 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
XWiki Platform是XWiki开源的一套用于创建Web协作应用程序的Wiki平台。 XWiki Platform存在安全漏洞,该漏洞源于任何来宾用户都可以通过对SolrSearch的请求,造成远程代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
xwikixwiki-platform >= 5.3-milestone-2, < 15.10.11 -
II. Public POCs for CVE-2025-24893
#POC DescriptionSource LinkShenlong Link
1XWiki Remote Code Execution (CVE-2025-24893) PoC https://github.com/sug4r-wr41th/CVE-2025-24893POC Details
2XWiki SolrSearchMacros 远程代码执行漏洞PoC(CVE-2025-24893)https://github.com/iSee857/CVE-2025-24893-PoCPOC Details
3Any guest can perform arbitrary remote code execution through a request to SolrSearch. This impacts the confidentiality, integrity, and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 15.10.11, 16.4.1, and 16.5.0RC1. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-24893.yamlPOC Details
4Nonehttps://github.com/Artemir7/CVE-2025-24893-EXPPOC Details
5Nonehttps://github.com/nopgadget/CVE-2025-24893POC Details
6This is a small script for the rce vulnerability for CVE-2025-24893. It supports basic input/outputhttps://github.com/Kai7788/CVE-2025-24893-RCE-PoCPOC Details
7this is a poc for the CVE-2025-24893https://github.com/AliElKhatteb/CVE-2024-32019-POCPOC Details
8Nonehttps://github.com/dhiaZnaidi/CVE-2025-24893-PoCPOC Details
9Modified exploit for CVE-2025-24893https://github.com/hackersonsteroids/cve-2025-24893POC Details
10PoC exploits CVE-2025-24893 , a remote code execution (RCE) vulnerability in XWiki caused by improper sandboxing in Groovy macros rendered asynchronously. It allows arbitrary command execution through injection into RSS-based SolrSearch endpoints.https://github.com/Infinit3i/CVE-2025-24893POC Details
11PoC for CVE-2025-24893: XWiki' Remote Code Execution exploit for versions prior to 15.10.11, 16.4.1 and 16.5.0RC1.https://github.com/gunzf0x/CVE-2025-24893POC Details
12CVE-2025-24893 is a critical unauthenticated remote code execution vulnerability in XWiki (versions < 15.10.11, 16.4.1, 16.5.0RC1) caused by improper handling of Groovy expressions in the SolrSearch macro.https://github.com/dollarboysushil/CVE-2025-24893-XWiki-Unauthenticated-RCE-Exploit-POCPOC Details
13PoC | XWiki Platform 15.10.10 - Remote Code Execution https://github.com/zs1n/CVE-2025-24893POC Details
14 Proof-of-Concept exploit for CVE-2025-24893, an unauthenticated Remote Code Execution (RCE) vulnerability in XWiki. Exploits a template injection flaw in the SolrSearch endpoint via Groovy script execution.https://github.com/investigato/cve-2025-24893-pocPOC Details
15PoC for CVE-2025-24893https://github.com/570RMBR3AK3R/xwiki-cve-2025-24893-pocPOC Details
16CVE-2025-24893 is a critical unauthenticated remote code execution (RCE) vulnerability in XWiki, a popular open-source enterprise wiki platform.https://github.com/IIIeJlyXaKapToIIIKu/CVE-2025-24893-XWiki-unauthenticated-RCE-via-SolrSearchPOC Details
17Bash POC script for RCE vulnerability in XWiki Platformhttps://github.com/mah4nzfr/CVE-2025-24893POC Details
18Nonehttps://github.com/Th3Gl0w/CVE-2025-24893-POCPOC Details
19This vulnerability could allow a malicious user to execute remote code by sending appropriately crafted requests to the default search engine SolrSearchhttps://github.com/Hex00-0x4/CVE-2025-24893-XWiki-RCEPOC Details
20POChttps://github.com/The-Red-Serpent/CVE-2025-24893POC Details
21XWiki 15.10.11, 16.4.1 and 16.5.0RC1 Unauthenticated Remote code execution POChttps://github.com/alaxar/CVE-2025-24893POC Details
22POC exploit for CVE-2025-24893https://github.com/D3Ext/CVE-2025-24893POC Details
23A POC for CVE-2025-24893 written in python https://github.com/Retro023/CVE-2025-24893-POCPOC Details
24PoC exploit for XWiki Remote Code Execution Vulnerability (CVE-2025-24893)https://github.com/CMassa/CVE-2025-24893POC Details
25Some poorly crafted exploit scriptshttps://github.com/x0da6h/POC-for-CVE-2025-24893POC Details
26A critical remote code execution (RCE) vulnerability (CVE‑2025‑24893) exists in the XWiki Platform, specifically in the SolrSearch RSS feed endpoint.https://github.com/ibadovulfat/CVE-2025-24893_HackTheBox-Editor-WriteupPOC Details
27Unauth RCE PoC for XWiki SolrSearch (CVE-2025-24893). Command exec + reverse shell. Built during process of pwning HTB “Editor”https://github.com/torjan0/xwiki_solrsearch-rce-exploitPOC Details
28Reverse Shell Payload for CVE-2025-24893https://github.com/AzureADTrent/CVE-2025-24893-Reverse-ShellPOC Details
29Nonehttps://github.com/b0ySie7e/CVE-2025-24893POC Details
30Nonehttps://github.com/andwati/CVE-2025-24893POC Details
31CVE-2025-24893 RCE exploit for XWiki with reverse shell capabilityhttps://github.com/Bishben/xwiki-15.10.8-reverse-shell-cve-2025-24893POC Details
32Unauthenticated Remote Code Execution in XWiki via SolrSearch Macrohttps://github.com/gotr00t0day/CVE-2025-24893POC Details
33CVE-2025-24893 exploit https://github.com/ibrahmsql/CVE-2025-24893POC Details
34Nonehttps://github.com/Yukik4z3/CVE-2025-24893POC Details
35Nonehttps://github.com/rvizx/CVE-2025-24893POC Details
36Nonehttps://github.com/Y2F05p2w/CVE-2025-24893POC Details
37XWiki Unauthenticated RCE Exploit for Reverse Shellhttps://github.com/80Ottanta80/CVE-2025-24893-PoCPOC Details
38CVE-2025-24893 toolhttps://github.com/kimtangker/CVE-2025-24893POC Details
39CVE-2025-24893https://github.com/B1ack4sh/Blackash-CVE-2025-24893POC Details
40CVE-2025-24893https://github.com/Ashwesker/Blackash-CVE-2025-24893POC Details
41Nonehttps://github.com/0xDTC/XWiki-Platform-RCE-CVE-2025-24893POC Details
42Nonehttps://github.com/o0wo0o/CVE-2025-24893_ShellPOC Details
43CVE-2025-24893 is a critical remote code execution (RCE) vulnerability in XWiki. It allows an unauthenticated attacker to send a crafted request that is improperly evaluated as code, leading to arbitrary code execution on the server and possible full system compromise.https://github.com/WhiteDominion/CVE-2025-24893POC Details
44Proof of Concept for CVE-2025-24893 demonstrating unauthenticated remote command execution in XWiki through unsafe server-side template evaluation.https://github.com/BreakingRohit/CVE-2025-24893-PoCPOC Details
45CVE-2025-24893https://github.com/Ashwesker/Ashwesker-CVE-2025-24893POC Details
46Unauthenticated RCE exploit for XWiki CVE-2025-24893 via Groovy script injectionhttps://github.com/TomKingori/xwiki-cve-2025-24893-exploitPOC Details
47CVE-2025-24893 | Vulnérabilité d'exécution de code à distance sur la plateforme XWiki (preuve de concept)https://github.com/nohack1212/CVE-2025-24893-POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-24893
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-24893
Anonymous User
2026-01-15 06:08:49

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


Leave a comment