Miggo Logo

CVE-2025-32973:
org.xwiki.platform:xwiki-platform-component-wiki provides no warning when granting XWiki.ComponentClass programming right

9.1

CVSS Score
3.1

Basic Information

EPSS Score
0.74911%
Published
4/29/2025
Updated
4/30/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.xwiki.platform:xwiki-platform-component-wikimaven>= 15.9-rc-1, < 15.10.1215.10.12
org.xwiki.platform:xwiki-platform-component-wikimaven>= 16.0.0-rc-1, < 16.4.316.4.3
org.xwiki.platform:xwiki-platform-component-wikimaven>= 16.5.0-rc-1, < 16.8.0-rc-116.8.0-rc-1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability (GHSA-x7wv-5qg4-vmr6 / CVE-2025-32973) in XWiki is due to the absence of a warning and rights check when a user with programming rights edits a document containing an XWiki.ComponentClass object that was last modified by a user without programming rights. This could lead to an unintended elevation of privileges for the component.

The provided commit 1a6f1b2e050770331c9a63d12a3fd8a36d199f62 addresses this vulnerability by adding a new component, org.xwiki.component.wiki.internal.WikiComponentRequiredRightAnalyzer, and its analyze method. This analyzer is specifically designed to perform the missing rights check for XWiki.ComponentClass objects.

The patch does not modify existing functions to fix a flaw within them; rather, it introduces new code that serves as a mitigation. The vulnerability lay in the omission of such a check in the document saving/processing workflow. While this workflow involves functions that were implicitly part of the vulnerable process (by not performing the check), these functions are not directly modified in the provided patch. The patch only shows the added mitigation.

According to the analysis guidelines:

  • We must focus on what is explicitly visible in the patches.
  • We need to identify functions that contain the vulnerability.
  • If a function was modified as a mitigation, it should be assessed as such.

The new function org.xwiki.component.wiki.internal.WikiComponentRequiredRightAnalyzer.analyze(BaseObject object) is the mitigation itself and is not vulnerable. Since the patch consists of adding this mitigation and there's no modification of pre-existing code that directly reveals a vulnerable function (other than by implication of its prior absence), no vulnerable functions can be identified directly from the patch content. The vulnerability was a system-level omission rather than a flaw in a specific, existing, and then modified function shown in this patch.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t W**n * us*r wit* pro*r*mmin* ri**t **its * *o*um*nt in XWiki t**t w*s l*st **it** *y * us*r wit*out pro*r*mmin* ri**t *n* *ont*ins *n `XWiki.*ompon*nt*l*ss`, t**r* is no w*rnin* t**t t*is will *r*nt pro*r*mmin* ri**t to t*is o*j**t. *n *t

Reasoning

T** vuln*r**ility (**S*-x*wv-*q**-vmr* / *V*-****-*****) in XWiki is *u* to t** ***s*n*** o* * w*rnin* *n* ri**ts ****k w**n * us*r wit* pro*r*mmin* ri**ts **its * *o*um*nt *ont*inin* *n `XWiki.*ompon*nt*l*ss` o*j**t t**t w*s l*st mo*i*i** *y * us*r