Cyber Posture

CVE-2025-55747

Critical

Published: 03 September 2025

Published
03 September 2025
Modified
10 September 2025
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0147 81.1th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-55747 is a critical-severity Relative Path Traversal (CWE-23) vulnerability in Xwiki Xwiki. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 18.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and correction of the path traversal flaw in the XWiki webjars API, enabling patching to version 16.10.7 to block unauthorized configuration file access.

prevent

Enforces approved authorizations to prevent unauthenticated remote attackers from accessing sensitive configuration files through the vulnerable webjars API.

prevent

Validates information inputs to the webjars API to detect and reject relative path traversal attempts (CWE-23) targeting configuration files.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Direct path traversal in public-facing web API enables remote file access on the system.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 6.1-milestone-2 through 16.10.6, configuration files are accessible through the webjars API. This is fixed in version 16.10.7.

Deeper analysisAI

CVE-2025-55747 affects the XWiki Platform, a generic wiki platform that provides runtime services for applications built on top of it. The vulnerability involves configuration files being accessible through the webjars API in versions from 6.1-milestone-2 through 16.10.6. Classified under CWE-23 (Relative Path Traversal), it has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating critical severity due to high impacts on confidentiality and integrity.

A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. By leveraging the webjars API, the attacker gains unauthorized access to configuration files, potentially exposing sensitive information (high confidentiality impact) and enabling modifications that could compromise system integrity (high integrity impact), while availability remains unaffected.

The issue is addressed in XWiki Platform version 16.10.7. Official mitigation guidance is available in the GitHub security advisory (GHSA-qww7-89xh-x7m7), the related Jira ticket (XWIKI-19350), and the fixing commit (9e7b4c03f2143978d891109a17159f73d4cdd318), which practitioners should review for patch details and upgrade instructions.

Details

CWE(s)

Affected Products

xwiki
xwiki
6.1 · 6.2 — 16.10.7 · 17.0.0 — 17.3.0

CVEs Like This One

CVE-2025-29924Same product: Xwiki Xwiki
CVE-2025-29926Same product: Xwiki Xwiki
CVE-2025-32429Same product: Xwiki Xwiki
CVE-2025-24893Same product: Xwiki Xwiki
CVE-2025-54385Same product: Xwiki Xwiki
CVE-2025-53836Same product: Xwiki Xwiki
CVE-2026-33229Same product: Xwiki Xwiki
CVE-2025-53835Same product: Xwiki Xwiki
CVE-2026-40104Same product: Xwiki Xwiki
CVE-2025-23025Same product: Xwiki Xwiki

References