Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| xwiki | xwiki-platform | >= 9.4-rc-1, < 16.10.6 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit for CVE-2025-32429 – SQLi in XWiki REST API (getdeleteddocuments.vm). | https://github.com/byteReaper77/CVE-2025-32429 | POC Details |
| 2 | Proof-of-Concept exploit for CVE-2025-32429 (SQL Injection in PHP PDO prepared statements) – for educational and security research purposes only | https://github.com/amir-othman/CVE-2025-32429 | POC Details |
| 3 | None | https://github.com/imbas007/CVE-2025-32429-Checker | POC Details |
| 4 | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 9.4-rc-1 through 16.10.5 and 17.0.0-rc-1 through 17.2.2, it's possible for anyone to inject SQL using the parameter sort of the getdeleteddocuments.vm. It's injected as is as an ORDER BY value. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-32429.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet