CVE-2025-32429
CRITICALCVSS v3
9.8
CRITICAL
EPSS Score
28.1%
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 9.4-rc-1 through 16.10.5 and 17.0.0-rc-1 through 17.2.2, it's possible for anyone to inject SQL using the parameter sort of the getdeleteddocuments.vm. It's injected as is as an ORDER BY value. This is fixed in versions 16.10.6 and 17.3.0-rc-1.
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 7/24/2025
- Last Modified
- 9/3/2025
- Exploit-DB
- EDB-52384
Frequently Asked Questions
What is CVE-2025-32429?
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 9.4-rc-1 through 16.10.5 and 17.0.0-rc-1 through 17.2.2, it's possible for anyone to inject SQL using the parameter sort of the getdeleteddocuments.vm. It's injected as is as an ORDER BY value. This is fixed in versions 16.10.6 and 17.3.0-rc-1.
Is CVE-2025-32429 actively exploited?
Active exploitation of CVE-2025-32429 has not been confirmed. The EPSS score is 28.1%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2025-32429?
CVE-2025-32429 has a CVSS v3 base score of 9.8 (CRITICAL severity), with vector string 3.1.
Is CVE-2025-32429 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.