Skip to content

Commit e0fec0e

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 9283562 commit e0fec0e

File tree

1 file changed

+60
-0
lines changed

1 file changed

+60
-0
lines changed

db/modules_metadata_base.json

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -121540,6 +121540,66 @@
121540121540
"session_types": false,
121541121541
"needs_cleanup": null
121542121542
},
121543+
"exploit_multi/http/xwiki_unauth_rce_cve_2025_24893": {
121544+
"name": "Remote Code Execution Vulnerability in XWiki Platform (CVE-2025-24893)",
121545+
"fullname": "exploit/multi/http/xwiki_unauth_rce_cve_2025_24893",
121546+
"aliases": [],
121547+
"rank": 600,
121548+
"disclosure_date": "2025-02-20",
121549+
"type": "exploit",
121550+
"author": [
121551+
"Maksim Rogov",
121552+
"John Kwak"
121553+
],
121554+
"description": "This module exploits a template injection vulnerability in the the XWiki Platform.\n XWiki includes a macro called SolrSearch (defined in Main.SolrSearchMacros) that enables full-text search through the embedded Solr engine.\n The vulnerability stems from the way this macro evaluates search parameters in Groovy, failing to sanitize or restrict malicious input.\n\n This vulnerability affects XWiki Platform versions >= 5.3-milestone-2 and < 15.10.11, and versions >= 16.0.0-rc-1 and < 16.4.1.\n Successful exploitation may result in the remote code execution under the privileges\n of the web server, potentially exposing sensitive data or disrupting survey operations.\n\n An attacker can execute arbitrary system commands in the context of the user running the web server.",
121555+
"references": [
121556+
"CVE-2025-24893",
121557+
"URL-https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-rr6p-3pfg-562j"
121558+
],
121559+
"platform": "Linux,Unix,Windows",
121560+
"arch": "cmd",
121561+
"rport": 80,
121562+
"autofilter_ports": [
121563+
80,
121564+
8080,
121565+
443,
121566+
8000,
121567+
8888,
121568+
8880,
121569+
8008,
121570+
3000,
121571+
8443
121572+
],
121573+
"autofilter_services": [
121574+
"http",
121575+
"https"
121576+
],
121577+
"targets": [
121578+
"Unix Command",
121579+
"Windows Command"
121580+
],
121581+
"mod_time": "2025-08-29 08:41:43 +0000",
121582+
"path": "/modules/exploits/multi/http/xwiki_unauth_rce_cve_2025_24893.rb",
121583+
"is_install_path": true,
121584+
"ref_name": "multi/http/xwiki_unauth_rce_cve_2025_24893",
121585+
"check": true,
121586+
"post_auth": false,
121587+
"default_credential": false,
121588+
"notes": {
121589+
"Stability": [
121590+
"crash-safe"
121591+
],
121592+
"SideEffects": [
121593+
"ioc-in-logs",
121594+
"artifacts-on-disk"
121595+
],
121596+
"Reliability": [
121597+
"repeatable-session"
121598+
]
121599+
},
121600+
"session_types": false,
121601+
"needs_cleanup": null
121602+
},
121543121603
"exploit_multi/http/zabbix_script_exec": {
121544121604
"name": "Zabbix Authenticated Remote Command Execution",
121545121605
"fullname": "exploit/multi/http/zabbix_script_exec",

0 commit comments

Comments
 (0)