Critical severityOSV Advisory· Published Jan 10, 2026· Updated Jan 12, 2026
XWiki Full Calendar Macro vulnerable to SQL injection through Calendar.JSONService
CVE-2025-65091
Description
XWiki Full Calendar Macro displays objects from the wiki on the calendar. Prior to version 2.4.5, users with the right to view the Calendar.JSONService page (including guest users) can exploit a SQL injection vulnerability by accessing database info or starting a DoS attack. This issue has been patched in version 2.4.5.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.xwiki.contrib:macro-fullcalendar-pomMaven | < 2.4.5 | 2.4.5 |
Affected products
1- Range: macro-fullcalendar-1.1.6, macro-fullcalendar-1.1.7, macro-fullcalendar-1.1.8, …
Patches
15fdcf06a0501Merge commit from fork
1 file changed · +4 −8
macro-fullcalendar-ui/src/main/resources/Calendar/JSONService.xml+4 −8 modified@@ -44,17 +44,13 @@ #if ("$!{request.outputSyntax}" == 'plain') $response.setContentType('application/json') #end - ## - #if ("$!{request.sql}" != '') - #set ($hql = $request.sql) - #else - #set ($hql =", BaseObject as obj $!{request.fromsql} where doc.fullName=obj.name and obj.className='${request.classname}' $!{request.wheresql}") - #end - ## + #set ($hqlStatement =", BaseObject as obj $!{request.fromsql} where doc.fullName=obj.name and obj.className=:classname $!{request.wheresql}") #set ($jsonResult = []) #set ($started = false) #set ($extraFields = $request.extraFields.split(',')) - #foreach ($item in $services.query.hql($hql).addFilter('currentlanguage').execute()) + ## Drop programming rights before executing the query execution to ensure it is properly validated. + #set ($discard = $xcontext.dropPermissions()) + #foreach ($item in $services.query.hql($hqlStatement).bindValue("classname", "$!{request.classname}").addFilter('currentlanguage').execute()) #set ($itemdoc = $xwiki.getDocument($item)) #set ($startField = $request.startfield) ##
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4- github.com/advisories/GHSA-2g22-wg49-fgv5ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-65091ghsaADVISORY
- github.com/xwiki-contrib/macro-fullcalendar/commit/5fdcf06a05015786492fda69b4d9dea5460cc994ghsax_refsource_MISCWEB
- github.com/xwiki-contrib/macro-fullcalendar/security/advisories/GHSA-2g22-wg49-fgv5ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.