Miggo Logo

CVE-2025-55748: XWiki configuration files can be accessed through jsx and sx endpoints

N/A

CVSS Score

Basic Information

EPSS Score
-
Published
9/3/2025
Updated
9/3/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.xwiki.platform:xwiki-platform-skin-skinxmaven>= 4.2-milestone-2, < 16.10.716.10.7

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability lies in multiple locations within the XWiki platform where user-provided resource paths are used to access files from the classpath without proper sanitization. This allows for path traversal attacks, enabling an attacker to read sensitive configuration files like xwiki.cfg.

The analysis of the patch 9e7b4c03f2143978d891109a17159f73d4cdd318 reveals a clear pattern: multiple methods that were previously using ClassLoader.getResource() or ClassLoader.getResourceAsStream() with unsanitized input have been updated to use a new utility, ClassLoaderUtils. This utility centralizes path validation and prevents traversal outside of the intended directories.

The key vulnerable functions identified are:

  1. com.xpn.xwiki.internal.template.InternalTemplateManager.getClassloaderTemplate: This function had a manual and flawed path traversal check that could be bypassed.
  2. com.xpn.xwiki.web.sx.SxResourceSource.getContent: This function handled requests to the /sx/ endpoint and directly used a user-controlled resource name to fetch files.
  3. org.xwiki.webjars.internal.WebJarsResourceReferenceHandler.getResourceStream: This function handled requests for webjar resources and was vulnerable in how it constructed the resource path from user input.

By exploiting these functions through crafted URLs, an attacker could gain access to sensitive system information, as demonstrated by the added test cases which attempt to read WEB-INF/xwiki.cfg.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t It's possi*l* to **t ****ss *n* r*** *on*i*ur*tion *il*s *y usin* URLs su** *s `*ttp://lo**l*ost:****/*in/ssx/M*in/W***om*?r*sour**=../../W**-IN*/xwiki.***&mini*y=**ls*`. T*is **n *pp*r*ntly ** r*pro*u*** on Tom**t inst*n**s. ### P*t***

Reasoning

T** vuln*r**ility li*s in multipl* lo**tions wit*in t** XWiki pl*t*orm w**r* us*r-provi*** r*sour** p*t*s *r* us** to ****ss *il*s *rom t** *l*ssp*t* wit*out prop*r s*nitiz*tion. T*is *llows *or p*t* tr*v*rs*l *tt**ks, *n**lin* *n *tt**k*r to r*** s*