November 17 Advisory: XWiki Platform Allows Unauthorized RCE Via RondoDox Botnet [CVE-2025-24893]

Rapid Response

Vulnerability Description 

A vulnerability in XWiki Platform allows an unauthenticated attacker to achieve remote code execution by abusing unsafe user-controlled input handling in the SolrSearch macro (SolrSearchMacros). By injecting crafted requests into the macro, an attacker can trigger server-side code execution, leading to full compromise of the XWiki instance.

Screenshot-2025-11-17-at-5.28.58-PM.png
FieldDescription
CVE-IDCVE-2025-24893 — CVSS 9.8 — assigned by GitHub, Inc.
Vulnerability DescriptionXWiki Platform is a generic wiki platform.An unauthenticated attacker can achieve remote code execution by abusing unsafe user-controlled input handling in the SolrSearch macro (SolrSearchMacros).Crafted requests injected into the macro result in server-side code execution, allowing full compromise of the XWiki instance.
Date of DisclosureFebruary 20, 2025
Affected AssetsXWiki Platform
Vulnerable Software VersionsXWiki Platform versions:≥ 5.3-milestone-2 and < 15.10.11≥ 16.0.0-rc-1 and < 16.4.1All deployments exposing the vulnerable SolrSearch macro to unauthenticated users are impacted.
PoC Available?Yes, available on GitHub.
Exploitation StatusConfirmed exploitation in the wild.Added to the CISA Known Exploited Vulnerabilities (KEV) catalog on October 30, 2025
Patch StatusFixed in XWiki 15.10.1116.4.1, and later.Workaround: modify Main.SolrSearchMacros to change the rawResponse macro output type to application/xml.

Censys Perspective

The following queries can be used to identify potentially exposed instances. At the time of writing, we observe 2.9k XWiki Platform instances exposed online. Note that not all of these are necessarily vulnerable. 

Platform:

web.software.product=”xwiki” and not web.labels.value=”HONEYPOT”

ASM:

risks.name=”Vulnerable XWiki [CVE-2025-24893]”

Legacy Search:

services.software.product=”XWiki” and not labels={“honeypot”, “tarpit”}

References

Subscribe to our blog