Description
XWiki Rendering is a generic rendering system that converts textual input in a given syntax (wiki syntax, HTML, etc) into another syntax (XHTML, etc). Starting in version 5.4.5 and prior to version 14.10, the XHTML syntax depended on the `xdom+xml/current` syntax which allows the creation of raw blocks that permit the insertion of arbitrary HTML content including JavaScript. This allows XSS attacks for users who can edit a document like their user profile (enabled by default). This has been fixed in version 14.10 by removing the dependency on the `xdom+xml/current` syntax from the XHTML syntax. Note that the `xdom+xml` syntax is still vulnerable to this attack. As it's main purpose is testing and its use is quite difficult, this syntax shouldn't be installed or used on a regular wiki. There are no known workarounds apart from upgrading.
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2025-53835, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2025-53835 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.
References:
- http://webappsec.pbworks.com/Cross-Site+Scripting
- https://capec.mitre.org/data/definitions/209.html
- https://capec.mitre.org/data/definitions/588.html
- https://capec.mitre.org/data/definitions/591.html
- https://capec.mitre.org/data/definitions/592.html
- https://capec.mitre.org/data/definitions/63.html
- https://capec.mitre.org/data/definitions/85.html
- https://nvd.nist.gov/vuln/detail/CVE-2025-53835