Unrated severityNVD Advisory· Published Sep 9, 2025· Updated Sep 11, 2025
XWiki Remote Macros vulnerable to remote code execution using the panel macro
CVE-2025-55728
Description
XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the classes parameter in the panel macro allows remote code execution for any user who can edit any page The classes parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution. Version 1.26.5 contains a patch for the issue.
Affected products
2- Range: >=1.0 <1.26.5
- xwikisas/xwiki-pro-macrosv5Range: >= 1.0, < 1.26.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/xwikisas/xwiki-pro-macros/blob/93ac1a38c829e3ef787379b2b45eb043a573e5f7/xwiki-pro-macros-ui/src/main/resources/XWiki/Macros/Panel.xmlmitrex_refsource_MISC
- github.com/xwikisas/xwiki-pro-macros/commit/3ca815294bf54fc024b2363efbece7aa08b8efd5mitrex_refsource_MISC
- github.com/xwikisas/xwiki-pro-macros/security/advisories/GHSA-48f4-h726-74p5mitrex_refsource_CONFIRM
- jira.xwiki.org/browse/XWIKI-20449mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.