Development

Critical vulnerability in SAP NetWeaver enables malicious file uploads

Adversaries can exploit CVE-2025-31324 to upload web shells and other unauthorized files to execute on the SAP NetWeaver server April 30, 2025Red Canary has observed activity exploiting a newly-docume …
Read more

Published Date:
Apr 30, 2025 (3 hours, 38 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-31324

CVE ID : CVE-2025-46557

Published : April 30, 2025, 7:15 p.m. | 3 hours, 53 minutes ago

Description : XWiki is a generic wiki platform. In versions starting from 15.3-rc-1 to before 15.10.14, from 16.0.0-rc-1 to before 16.4.6, and from 16.5.0-rc-1 to before 16.10.0-rc-1, a user who can access pages located in the XWiki space (by default, anyone) can access the page XWiki.Authentication.Administration and (unless an authenticator is set in xwiki.cfg) switch to another installed authenticator. Note that, by default, there is only one authenticator available (Standard XWiki Authenticator). So, if no authenticator extension was installed, it’s not really possible to do anything for an attacker. Also, in most cases, if an SSO authenticator is installed and utilized (like OIDC or LDAP for example), the worst an attacker can do is break authentication by switching back to the standard authenticator (that’s because it’s impossible to login to a user which does not have a stored password, and that’s usually what SSO authenticator produce). This issue has been patched in versions 15.10.14, 16.4.6, and 16.10.0-rc-1.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…