Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-49584

CVE-2025-49584: XWiki Information Disclosure Vulnerability

CVE-2025-49584 is an information disclosure vulnerability in XWiki Platform that exposes page titles through the REST API. Attackers can access titles of known page references. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: April 22, 2026

CVE-2025-49584 Overview

CVE-2025-49584 is an information disclosure vulnerability affecting XWiki Platform, a widely-deployed open-source wiki platform. The vulnerability allows unauthenticated attackers to access page titles through the REST API by exploiting insufficient access control checks on XClass property value providers. While the REST endpoint verifies access rights on XClass definitions, it fails to properly validate permissions when retrieving page titles for pages referenced via page properties.

This vulnerability is particularly concerning for organizations that rely on obfuscated page names to protect sensitive information, as attackers can enumerate page titles by making individual REST API requests for any known page reference.

Critical Impact

Attackers can bypass access controls to retrieve page titles of restricted content through the REST API, potentially exposing sensitive information in wiki environments where page titles contain confidential data.

Affected Products

  • XWiki Platform versions 10.9 through 16.4.6
  • XWiki Platform versions 16.5.0-rc-1 through 16.10.2
  • XWiki Platform version 17.0.0-rc-1

Discovery Timeline

  • June 13, 2025 - CVE-2025-49584 published to NVD
  • September 03, 2025 - Last updated in NVD database

Technical Details for CVE-2025-49584

Vulnerability Analysis

The vulnerability resides in the REST API's handling of XClass property value providers. When an XClass with a page property is accessible (which is the default configuration in XWiki installations), the REST endpoint allows retrieval of page titles without performing adequate authorization checks on the target pages themselves.

The core issue is a missing access control verification step. While the system correctly validates that the requesting user has access to the XClass definition, it does not verify whether the user should have permission to view the titles of the pages referenced by that XClass property. This creates an authorization bypass where page titles can be enumerated one request at a time.

The impact severity depends significantly on the organization's page naming conventions. In default XWiki configurations where page names typically match their titles, the information disclosure risk is relatively limited. However, for deployments where page names are intentionally obfuscated to protect sensitive title information, this vulnerability represents a significant confidentiality breach.

Root Cause

The root cause is an improper access control implementation (CWE-201: Insertion of Sensitive Information Into Sent Data) in the AbstractDocumentListClassPropertyValuesProvider and GroupsClassPropertyValuesProvider classes. These components handle property value suggestions for XClass properties but fail to perform authorization checks before returning page title information. The code path allows the title data to be included in API responses without verifying the requesting user's right to access the associated page content.

Attack Vector

The attack is network-based and requires no authentication or user interaction. An attacker with knowledge of page references in the target XWiki installation can craft REST API requests to the property values endpoint. By specifying page references in the request parameters, the attacker receives the corresponding page titles in the response, effectively bypassing any access restrictions on those pages.

The attack flow involves:

  1. Identifying accessible XClass definitions with page properties
  2. Constructing REST API requests targeting the property values endpoint
  3. Supplying known page references as query parameters
  4. Extracting page titles from the API response
java
// Security patch adding authorization checks
// Source: https://github.com/xwiki/xwiki-platform/commit/ee642f973a7c95d2d146fe03c81bcdee1871f4ec

 import org.xwiki.rest.model.jaxb.PropertyValue;
 import org.xwiki.rest.model.jaxb.PropertyValues;
 import org.xwiki.rest.resources.classes.ClassPropertyValuesProvider;
+import org.xwiki.security.authorization.ContextualAuthorizationManager;
+import org.xwiki.security.authorization.Right;
 
 import com.xpn.xwiki.XWiki;
 import com.xpn.xwiki.XWikiContext;

The patch introduces the ContextualAuthorizationManager and Right classes to enforce proper access control checks before returning page titles. Additional changes in GroupsClassPropertyValuesProvider similarly add the Right import to support authorization validation:

java
// Additional authorization import for GroupsClassPropertyValuesProvider
// Source: https://github.com/xwiki/xwiki-platform/commit/ee642f973a7c95d2d146fe03c81bcdee1871f4ec

 import org.xwiki.query.QueryBuilder;
 import org.xwiki.rendering.syntax.Syntax;
 import org.xwiki.rest.model.jaxb.PropertyValues;
+import org.xwiki.security.authorization.Right;
 import org.xwiki.wiki.user.UserScope;
 import org.xwiki.wiki.user.WikiUserManager;

Detection Methods for CVE-2025-49584

Indicators of Compromise

  • Unusual volume of REST API requests targeting property values endpoints
  • API requests containing references to pages the requesting user should not have access to
  • Sequential or enumeration-pattern requests to property value providers
  • Unauthenticated access attempts to REST API endpoints related to XClass properties

Detection Strategies

  • Monitor REST API access logs for requests to /rest/wikis/*/classes/*/properties/*/values endpoints
  • Implement rate limiting detection for property value provider endpoints
  • Alert on API requests from unauthenticated sessions attempting to access class property values
  • Analyze request patterns for systematic page reference enumeration attempts

Monitoring Recommendations

  • Enable detailed logging for XWiki REST API endpoints
  • Deploy web application firewall rules to detect and block enumeration attempts
  • Configure SIEM rules to correlate multiple property value requests from single sources
  • Establish baseline metrics for normal REST API usage to identify anomalous patterns

How to Mitigate CVE-2025-49584

Immediate Actions Required

  • Upgrade XWiki Platform to version 16.4.7, 16.10.3, or 17.0.0 immediately
  • Review REST API access logs for potential exploitation attempts
  • Audit page titles for sensitive information exposure
  • Consider restricting REST API access to authenticated users only as a temporary measure

Patch Information

XWiki has released security patches that add proper access control checks before returning page titles. The fix is included in:

  • XWiki 16.4.7 - Patch for the 16.4.x branch
  • XWiki 16.10.3 - Patch for the 16.10.x branch
  • XWiki 17.0.0 - Patch for the 17.x branch

The security fix is documented in XWiki Jira Issue XWIKI-22736 and the GitHub Security Advisory GHSA-mvp5-qx9c-c3fv. The patch commit can be reviewed at the GitHub Commit Reference.

Workarounds

  • Convert to a fully private wiki configuration where REST endpoint access requires authentication to the XClass definition
  • Implement network-level restrictions to limit REST API access to trusted IP ranges
  • Deploy a reverse proxy with authentication requirements for REST API endpoints
  • Review and sanitize page titles to remove sensitive information where possible
bash
# Configuration example - Restrict REST API access via reverse proxy
# Apache configuration to require authentication for XWiki REST API
<Location "/xwiki/rest/">
    AuthType Basic
    AuthName "XWiki REST API"
    AuthUserFile /etc/apache2/.htpasswd
    Require valid-user
</Location>

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechXwiki

  • SeverityHIGH

  • CVSS Score8.7

  • EPSS Probability0.10%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-201
  • Vendor Resources
  • GitHub Commit Reference

  • GitHub Security Advisory

  • XWiki Jira Issue XWIKI-22736
  • Related CVEs
  • CVE-2025-65090: XWiki Calendar Information Disclosure Flaw

  • CVE-2025-55749: XWiki Information Disclosure Vulnerability

  • CVE-2026-40104: XWiki Platform DoS Vulnerability

  • CVE-2026-40105: XWiki Platform XSS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English