CVE-2025-49583

| EUVD-2025-18298 LOW
3.5
CVSS 3.1

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None

Lifecycle Timeline

5
Analysis Generated
Mar 14, 2026 - 21:34 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 21:34 euvd
EUVD-2025-18298
Patch Released
Mar 14, 2026 - 21:34 nvd
Patch available
PoC Detected
Sep 03, 2025 - 17:50 vuln.today
Public exploit code
CVE Published
Jun 13, 2025 - 17:15 nvd
LOW 3.5

Description

XWiki is a generic wiki platform. When a user without script right creates a document with an `XWiki.Notifications.Code.NotificationEmailRendererClass` object, and later an admin edits and saves that document, the email templates in this object will be used for notifications. No malicious code can be executed, though, as while these templates allow Velocity code, the existing generic analyzer already warns admins before editing Velocity code. The main impact would thus be to send spam, e.g., with phishing links to other users or to hide notifications about other attacks. Note that warnings before editing documents with dangerous properties have only been introduced in XWiki 15.9, before that version, this was a known issue and the advice was simply to be careful. This has been patched in XWiki 16.10.2, 16.4.7 and 15.10.16 by adding an analysis for the respective XClass properties.

Analysis

A security vulnerability in XWiki (CVSS 3.5). Risk factors: public PoC available. Vendor patch is available.

Technical Context

Vulnerability type not specified by vendor. Affects XWiki.

Affected Products

['XWiki']

Remediation

Apply the vendor-supplied patch immediately.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +18
POC: +20

Share

CVE-2025-49583 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy