{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-55728","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-08-14T22:31:17.682Z","datePublished":"2025-09-09T18:40:51.874Z","dateUpdated":"2025-09-11T13:15:28.508Z"},"containers":{"cna":{"title":"XWiki Remote Macros vulnerable to remote code execution using the panel macro","problemTypes":[{"descriptions":[{"cweId":"CWE-95","lang":"en","description":"CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/xwikisas/xwiki-pro-macros/security/advisories/GHSA-48f4-h726-74p5","tags":["x_refsource_CONFIRM"],"url":"https://github.com/xwikisas/xwiki-pro-macros/security/advisories/GHSA-48f4-h726-74p5"},{"name":"https://github.com/xwikisas/xwiki-pro-macros/commit/3ca815294bf54fc024b2363efbece7aa08b8efd5","tags":["x_refsource_MISC"],"url":"https://github.com/xwikisas/xwiki-pro-macros/commit/3ca815294bf54fc024b2363efbece7aa08b8efd5"},{"name":"https://github.com/xwikisas/xwiki-pro-macros/blob/93ac1a38c829e3ef787379b2b45eb043a573e5f7/xwiki-pro-macros-ui/src/main/resources/XWiki/Macros/Panel.xml#L554","tags":["x_refsource_MISC"],"url":"https://github.com/xwikisas/xwiki-pro-macros/blob/93ac1a38c829e3ef787379b2b45eb043a573e5f7/xwiki-pro-macros-ui/src/main/resources/XWiki/Macros/Panel.xml#L554"},{"name":"https://jira.xwiki.org/browse/XWIKI-20449","tags":["x_refsource_MISC"],"url":"https://jira.xwiki.org/browse/XWIKI-20449"}],"affected":[{"vendor":"xwikisas","product":"xwiki-pro-macros","versions":[{"version":">= 1.0, < 1.26.5","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-09-09T18:40:51.874Z"},"descriptions":[{"lang":"en","value":"XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the classes parameter in the panel macro allows remote code execution for any user who can edit any page The classes parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution. Version 1.26.5 contains a patch for the issue."}],"source":{"advisory":"GHSA-48f4-h726-74p5","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/xwikisas/xwiki-pro-macros/security/advisories/GHSA-48f4-h726-74p5","tags":["exploit"]},{"url":"https://jira.xwiki.org/browse/XWIKI-20449","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-11T13:15:05.740779Z","id":"CVE-2025-55728","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-11T13:15:28.508Z"}}]}}