Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-55749

CVE-2025-55749: XWiki Information Disclosure Vulnerability

CVE-2025-55749 is an information disclosure flaw in XWiki that exposes static files containing credentials in the webapp folder. This article covers the technical details, affected versions, and mitigation strategies.

Updated: January 22, 2026

CVE-2025-55749 Overview

CVE-2025-55749 is a high-severity information disclosure vulnerability affecting the XWiki open-source wiki software platform. In instances using the XWiki Jetty package (XJetty), a misconfiguration in the Jetty base directory handling exposes a context that allows unauthenticated attackers to statically access any file located in the webapp/ folder via URL. This vulnerability can lead to unauthorized access to sensitive files, including configuration files that may contain credentials.

Critical Impact

Unauthenticated remote attackers can access sensitive files in the webapp folder, potentially exposing credentials and other confidential information. With a CVSS score of 8.7 (HIGH) and an EPSS probability of 1.62%, this vulnerability poses significant risk to exposed XWiki instances.

Affected Products

  • XWiki Platform versions 16.7.0 to 16.10.10 (fixed in 16.10.11)
  • XWiki Platform versions 17.0.0 to 17.4.3 (fixed in 17.4.4)
  • XWiki Platform versions 17.5.0 to 17.6.x (fixed in 17.7.0)

Discovery Timeline

  • December 1, 2025 - CVE-2025-55749 published to NVD
  • December 2, 2025 - Last updated in NVD database

Technical Details for CVE-2025-55749

Vulnerability Analysis

The vulnerability exists in the XWiki Jetty package startup script (start_xwiki.sh) due to improper handling of the Jetty base directory path. When using a relative directory path for JETTY_BASE, Jetty does not correctly resolve the application context, inadvertently exposing static file access to the entire webapp/ directory structure. This allows remote attackers to craft URLs that directly access files within the web application folder without authentication.

The vulnerability is classified under CWE-284 (Improper Access Control), indicating a failure to properly restrict access to sensitive resources. The CVSS 4.0 vector (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) confirms this is a network-exploitable vulnerability requiring no privileges, no user interaction, and with high confidentiality impact.

Root Cause

The root cause lies in the start_xwiki.sh script where the JETTY_BASE variable was set to a relative path (.) instead of an absolute path. Jetty's context handling does not work correctly with relative directories, causing it to expose an unintended static file context that maps to the application's root directory structure.

Attack Vector

An attacker can exploit this vulnerability by sending specially crafted HTTP requests to the XWiki server. By targeting the exposed static context, attackers can access files within the webapp/ folder, including configuration files such as hibernate.cfg.xml or xwiki.cfg that may contain database credentials, LDAP passwords, or other sensitive information.

The following patches address the vulnerability by ensuring the Jetty base directory is properly resolved to an absolute path:

Patch 1 - Initial Fix:

bash
 mkdir -p $XWIKI_DATA_DIR/logs 2>/dev/null
 
 # Set up the Jetty Base directory (used for custom Jetty configuration) to be the current directory where this file is.
+# Jetty does not work well with a relative directory, so we resolve the absolute one
+JETTY_BASE=`pwd`
 # Also make sure the log directory exists since Jetty won't create it.
-JETTY_BASE=.
 mkdir -p $JETTY_BASE/logs 2>/dev/null
 
-# Specify Jetty's home directory to be the directory named jetty inside the jetty base directory.
-JETTY_HOME=jetty
+# Specify Jetty's home directory to be the directory named "jetty" inside the Jetty base directory.
+JETTY_HOME="$JETTY_BASE/jetty"
 XWIKI_OPTS="$XWIKI_OPTS -Djetty.home=$JETTY_HOME -Djetty.base=$JETTY_BASE"
 
 # Specify the encoding to use

Source: https://github.com/xwiki/xwiki-platform/commit/42fb063749dd88cc78196f72d7318b7179285ebd

Patch 2 - Refined Fix:

bash
 mkdir -p $XWIKI_DATA_DIR/logs 2>/dev/null
 
 # Set up the Jetty Base directory (used for custom Jetty configuration) to be the current directory where this file is.
-# Jetty does not work well with a relative directory, so we resolve the absolute one
-JETTY_BASE=`pwd`
+# Jetty does not work well with a relative directory, so we use the absolute one
+JETTY_BASE=$PRGDIR
 # Also make sure the log directory exists since Jetty won't create it.
 mkdir -p $JETTY_BASE/logs 2>/dev/null
 

Source: https://github.com/xwiki/xwiki-platform/commit/99a04a0e2143583f5154a43e02174155da7e8e10

Detection Methods for CVE-2025-55749

Indicators of Compromise

  • Unusual HTTP requests attempting to access files in /webapp/ or /WEB-INF/ directories
  • Access log entries showing requests for configuration files like hibernate.cfg.xml, xwiki.cfg, or xwiki.properties
  • Multiple requests probing for sensitive file paths from single IP addresses
  • HTTP 200 responses for static file requests that should normally return 403 or 404

Detection Strategies

Web Application Firewall (WAF) Rules:
Configure WAF rules to detect and block requests attempting to access sensitive configuration files or directory traversal patterns targeting the webapp/ folder structure.

Log Analysis:
Monitor web server access logs for suspicious patterns indicating file enumeration or direct access attempts to configuration directories. Look for requests containing path segments like /WEB-INF/, /classes/, or specific configuration file names.

SentinelOne Singularity Platform:
SentinelOne's behavioral AI engine can detect anomalous file access patterns and potential data exfiltration attempts. The platform's network visibility features can identify reconnaissance activities targeting web applications.

Monitoring Recommendations

Implement continuous monitoring for:

  • Unexpected file read operations in the XWiki application directory
  • Network traffic patterns suggesting credential harvesting or configuration file access
  • Authentication failures that may indicate credentials obtained through this vulnerability are being tested
  • Changes to configuration files that could indicate post-exploitation activity

How to Mitigate CVE-2025-55749

Immediate Actions Required

  • Update XWiki to a patched version immediately: 16.10.11, 17.4.4, or 17.7.0 or later
  • Review web server access logs for evidence of exploitation attempts
  • Rotate any credentials stored in configuration files within the webapp/ directory
  • Implement network-level access controls to restrict access to XWiki administrative interfaces

Patch Information

XWiki has released security patches addressing this vulnerability in the following versions:

BranchFixed VersionCommit Reference
16.10.x16.10.1142fb063749dd88cc78196f72d7318b7179285ebd
17.4.x17.4.499a04a0e2143583f5154a43e02174155da7e8e10
17.7.x17.7.0Included in release

For detailed information, refer to:

  • Security Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-53gx-j3p6-2rw9
  • Issue Tracker: https://jira.xwiki.org/browse/XWIKI-23438

Workarounds

If immediate patching is not possible, consider the following temporary mitigations:

bash
# Manually update start_xwiki.sh to use absolute paths
# Replace the JETTY_BASE assignment with:
JETTY_BASE=$(cd "$(dirname "$0")" && pwd)

# Ensure JETTY_HOME also uses an absolute reference:
JETTY_HOME="$JETTY_BASE/jetty"

# Additionally, configure your reverse proxy to block direct access to sensitive paths
# Example for nginx:
# location ~* /(WEB-INF|classes|META-INF)/ {
#     deny all;
#     return 404;
# }

Additionally, place XWiki behind a reverse proxy and configure access controls to prevent direct access to static file paths. Consider implementing network segmentation to limit exposure of the XWiki instance to trusted networks only.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechXwiki

  • SeverityHIGH

  • CVSS Score8.7

  • EPSS Probability1.62%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-284
  • Technical References
  • Github

  • Github

  • Github

  • Github

  • Jira Xwiki
  • Related CVEs
  • CVE-2025-65090: XWiki Calendar Information Disclosure Flaw

  • CVE-2025-49584: XWiki Information Disclosure Vulnerability

  • CVE-2026-40104: XWiki Platform DoS Vulnerability

  • CVE-2026-40105: XWiki Platform XSS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English