Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| xwiki | xwiki-platform | >= 5.3-milestone-2, < 15.10.11 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | XWiki Remote Code Execution (CVE-2025-24893) PoC | https://github.com/sug4r-wr41th/CVE-2025-24893 | POC Details |
| 2 | XWiki SolrSearchMacros 远程代码执行漏洞PoC(CVE-2025-24893) | https://github.com/iSee857/CVE-2025-24893-PoC | POC Details |
| 3 | Any guest can perform arbitrary remote code execution through a request to SolrSearch. This impacts the confidentiality, integrity, and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 15.10.11, 16.4.1, and 16.5.0RC1. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-24893.yaml | POC Details |
| 4 | None | https://github.com/Artemir7/CVE-2025-24893-EXP | POC Details |
| 5 | None | https://github.com/nopgadget/CVE-2025-24893 | POC Details |
| 6 | This is a small script for the rce vulnerability for CVE-2025-24893. It supports basic input/output | https://github.com/Kai7788/CVE-2025-24893-RCE-PoC | POC Details |
| 7 | this is a poc for the CVE-2025-24893 | https://github.com/AliElKhatteb/CVE-2024-32019-POC | POC Details |
| 8 | None | https://github.com/dhiaZnaidi/CVE-2025-24893-PoC | POC Details |
| 9 | Modified exploit for CVE-2025-24893 | https://github.com/hackersonsteroids/cve-2025-24893 | POC Details |
| 10 | PoC exploits CVE-2025-24893 , a remote code execution (RCE) vulnerability in XWiki caused by improper sandboxing in Groovy macros rendered asynchronously. It allows arbitrary command execution through injection into RSS-based SolrSearch endpoints. | https://github.com/Infinit3i/CVE-2025-24893 | POC Details |
| 11 | PoC for CVE-2025-24893: XWiki' Remote Code Execution exploit for versions prior to 15.10.11, 16.4.1 and 16.5.0RC1. | https://github.com/gunzf0x/CVE-2025-24893 | POC Details |
| 12 | CVE-2025-24893 is a critical unauthenticated remote code execution vulnerability in XWiki (versions < 15.10.11, 16.4.1, 16.5.0RC1) caused by improper handling of Groovy expressions in the SolrSearch macro. | https://github.com/dollarboysushil/CVE-2025-24893-XWiki-Unauthenticated-RCE-Exploit-POC | POC Details |
| 13 | PoC | XWiki Platform 15.10.10 - Remote Code Execution | https://github.com/zs1n/CVE-2025-24893 | POC Details |
| 14 | Proof-of-Concept exploit for CVE-2025-24893, an unauthenticated Remote Code Execution (RCE) vulnerability in XWiki. Exploits a template injection flaw in the SolrSearch endpoint via Groovy script execution. | https://github.com/investigato/cve-2025-24893-poc | POC Details |
| 15 | PoC for CVE-2025-24893 | https://github.com/570RMBR3AK3R/xwiki-cve-2025-24893-poc | POC Details |
| 16 | CVE-2025-24893 is a critical unauthenticated remote code execution (RCE) vulnerability in XWiki, a popular open-source enterprise wiki platform. | https://github.com/IIIeJlyXaKapToIIIKu/CVE-2025-24893-XWiki-unauthenticated-RCE-via-SolrSearch | POC Details |
| 17 | Bash POC script for RCE vulnerability in XWiki Platform | https://github.com/mah4nzfr/CVE-2025-24893 | POC Details |
| 18 | None | https://github.com/Th3Gl0w/CVE-2025-24893-POC | POC Details |
| 19 | This vulnerability could allow a malicious user to execute remote code by sending appropriately crafted requests to the default search engine SolrSearch | https://github.com/Hex00-0x4/CVE-2025-24893-XWiki-RCE | POC Details |
| 20 | POC | https://github.com/The-Red-Serpent/CVE-2025-24893 | POC Details |
| 21 | XWiki 15.10.11, 16.4.1 and 16.5.0RC1 Unauthenticated Remote code execution POC | https://github.com/alaxar/CVE-2025-24893 | POC Details |
| 22 | POC exploit for CVE-2025-24893 | https://github.com/D3Ext/CVE-2025-24893 | POC Details |
| 23 | A POC for CVE-2025-24893 written in python | https://github.com/Retro023/CVE-2025-24893-POC | POC Details |
| 24 | PoC exploit for XWiki Remote Code Execution Vulnerability (CVE-2025-24893) | https://github.com/CMassa/CVE-2025-24893 | POC Details |
| 25 | Some poorly crafted exploit scripts | https://github.com/x0da6h/POC-for-CVE-2025-24893 | POC Details |
| 26 | A critical remote code execution (RCE) vulnerability (CVE‑2025‑24893) exists in the XWiki Platform, specifically in the SolrSearch RSS feed endpoint. | https://github.com/ibadovulfat/CVE-2025-24893_HackTheBox-Editor-Writeup | POC Details |
| 27 | Unauth RCE PoC for XWiki SolrSearch (CVE-2025-24893). Command exec + reverse shell. Built during process of pwning HTB “Editor” | https://github.com/torjan0/xwiki_solrsearch-rce-exploit | POC Details |
| 28 | Reverse Shell Payload for CVE-2025-24893 | https://github.com/AzureADTrent/CVE-2025-24893-Reverse-Shell | POC Details |
| 29 | None | https://github.com/b0ySie7e/CVE-2025-24893 | POC Details |
| 30 | None | https://github.com/andwati/CVE-2025-24893 | POC Details |
| 31 | CVE-2025-24893 RCE exploit for XWiki with reverse shell capability | https://github.com/Bishben/xwiki-15.10.8-reverse-shell-cve-2025-24893 | POC Details |
| 32 | Unauthenticated Remote Code Execution in XWiki via SolrSearch Macro | https://github.com/gotr00t0day/CVE-2025-24893 | POC Details |
| 33 | CVE-2025-24893 exploit | https://github.com/ibrahmsql/CVE-2025-24893 | POC Details |
| 34 | None | https://github.com/Yukik4z3/CVE-2025-24893 | POC Details |
| 35 | None | https://github.com/rvizx/CVE-2025-24893 | POC Details |
| 36 | None | https://github.com/Y2F05p2w/CVE-2025-24893 | POC Details |
| 37 | XWiki Unauthenticated RCE Exploit for Reverse Shell | https://github.com/80Ottanta80/CVE-2025-24893-PoC | POC Details |
| 38 | CVE-2025-24893 tool | https://github.com/kimtangker/CVE-2025-24893 | POC Details |
| 39 | CVE-2025-24893 | https://github.com/B1ack4sh/Blackash-CVE-2025-24893 | POC Details |
| 40 | CVE-2025-24893 | https://github.com/Ashwesker/Blackash-CVE-2025-24893 | POC Details |
| 41 | None | https://github.com/0xDTC/XWiki-Platform-RCE-CVE-2025-24893 | POC Details |
| 42 | None | https://github.com/o0wo0o/CVE-2025-24893_Shell | POC Details |
| 43 | CVE-2025-24893 is a critical remote code execution (RCE) vulnerability in XWiki. It allows an unauthenticated attacker to send a crafted request that is improperly evaluated as code, leading to arbitrary code execution on the server and possible full system compromise. | https://github.com/WhiteDominion/CVE-2025-24893 | POC Details |
| 44 | Proof of Concept for CVE-2025-24893 demonstrating unauthenticated remote command execution in XWiki through unsafe server-side template evaluation. | https://github.com/BreakingRohit/CVE-2025-24893-PoC | POC Details |
| 45 | CVE-2025-24893 | https://github.com/Ashwesker/Ashwesker-CVE-2025-24893 | POC Details |
| 46 | Unauthenticated RCE exploit for XWiki CVE-2025-24893 via Groovy script injection | https://github.com/TomKingori/xwiki-cve-2025-24893-exploit | POC Details |
| 47 | CVE-2025-24893 | Vulnérabilité d'exécution de code à distance sur la plateforme XWiki (preuve de concept) | https://github.com/nohack1212/CVE-2025-24893- | POC Details |
No public POC found.
Login to generate AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.