CVE-2025-53835

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-53835
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-53835.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-53835
Aliases
Related
Published
2025-07-14T23:15:25Z
Modified
2025-07-16T04:50:26.723403Z
Summary
[none]
Details

XWiki Rendering is a generic rendering system that converts textual input in a given syntax (wiki syntax, HTML, etc) into another syntax (XHTML, etc). Starting in version 5.4.5 and prior to version 14.10, the XHTML syntax depended on the xdom+xml/current syntax which allows the creation of raw blocks that permit the insertion of arbitrary HTML content including JavaScript. This allows XSS attacks for users who can edit a document like their user profile (enabled by default). This has been fixed in version 14.10 by removing the dependency on the xdom+xml/current syntax from the XHTML syntax. Note that the xdom+xml syntax is still vulnerable to this attack. As it's main purpose is testing and its use is quite difficult, this syntax shouldn't be installed or used on a regular wiki. There are no known workarounds apart from upgrading.

References

Affected packages

Git / github.com/xwiki/xwiki-rendering

Affected ranges

Type
GIT
Repo
https://github.com/xwiki/xwiki-rendering
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

xwiki-rendering-7.*

xwiki-rendering-7.3-milestone-2
xwiki-rendering-7.4-milestone-1
xwiki-rendering-7.4-milestone-2

xwiki-rendering-8.*

xwiki-rendering-8.0-milestone-1
xwiki-rendering-8.0-milestone-2
xwiki-rendering-8.1-milestone-1
xwiki-rendering-8.1-milestone-2
xwiki-rendering-8.2-milestone-1
xwiki-rendering-8.2-milestone-2
xwiki-rendering-8.3-milestone-1
xwiki-rendering-8.3-milestone-2