Miggo Logo

CVE-2025-55747: XWiki configuration files can be accessed through the webjars API

N/A

CVSS Score

Basic Information

EPSS Score
-
Published
9/3/2025
Updated
9/3/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.xwiki.platform:xwiki-platform-webjars-apimaven>= 6.1-milestone-2, < 16.10.716.10.7

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is a classic path traversal issue (CWE-23) where user-controlled input from the URL is used to construct file paths for resource loading. The core of the problem lies in the application's failure to properly sanitize and validate the resource paths before accessing them. The provided patch addresses this by introducing a centralized utility, ClassLoaderUtils, which is now used across different parts of the application to safely load resources. The analysis of the commit 9e7b4c03f2143978d891109a17159f73d4cdd318 clearly shows the replacement of direct, unsafe calls to getResourceAsStream and flawed manual path validation with calls to this new, safer utility. The vulnerable functions were identified by locating where these unsafe calls were made. Specifically, WebJarsResourceReferenceHandler.getResourceStream, InternalTemplateManager.getClassloaderTemplate, and SxResourceSource.getContent were all found to be constructing resource paths with user-controllable data without adequate sanitization, making them the primary entry points for this vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t It's possi*l* to **t ****ss *n* r*** *on*i*ur*tion *il*s *y usin* URLs su** *s `*ttp://lo**l*ost:****/xwiki/w**j*rs/wiki%**xwiki/..%**..%**..%**..%**..%**W**-IN*%**xwiki.***`. T** tri*k **r* is to *n*o** t** / w*i** is ***o*** w**n p*rsin

Reasoning

T** vuln*r**ility is * *l*ssi* p*t* tr*v*rs*l issu* (*W*-**) w**r* us*r-*ontroll** input *rom t** URL is us** to *onstru*t *il* p*t*s *or r*sour** lo**in*. T** *or* o* t** pro*l*m li*s in t** *ppli**tion's **ilur* to prop*rly s*nitiz* *n* v*li**t* t*