Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Last week in AI dev tools: Cloudflare blocking AI crawlers by default, Perplexity Max subscription, and more (July 7, 2025)

      July 7, 2025

      Infragistics Launches Ultimate 25.1 With Major Updates to App Builder, Ignite UI

      July 7, 2025

      Design Guidelines For Better Notifications UX

      July 7, 2025

      10 Top React.js Development Service Providers For Your Next Project In 2026

      July 7, 2025

      A million customer conversations with AI agents yielded this surprising lesson

      July 7, 2025

      Bookworms: Don’t skip this Kindle Paperwhite Essentials bundle that’s on sale

      July 7, 2025

      My favorite “non-gaming” gaming accessory is down to its lowest price for Prime Day | XREAL’s AR glasses give you a virtual cinema screen for Xbox Cloud Gaming, Netflix, PC gaming handhelds, and more

      July 7, 2025

      I’ve been using this Alienware 240Hz gaming monitor for 2 years — less than $1 a day if I’d bought it with this Prime Day discount

      July 7, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Token Limit – Monitor token usage in AI context files

      July 7, 2025
      Recent

      Token Limit – Monitor token usage in AI context files

      July 7, 2025

      Perficient Named a 2025 Best Place to Work in Orange County!

      July 7, 2025

      Perficient Recognized by Leading Analyst Firm for Automotive and Mobility Expertise

      July 7, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      My favorite “non-gaming” gaming accessory is down to its lowest price for Prime Day | XREAL’s AR glasses give you a virtual cinema screen for Xbox Cloud Gaming, Netflix, PC gaming handhelds, and more

      July 7, 2025
      Recent

      My favorite “non-gaming” gaming accessory is down to its lowest price for Prime Day | XREAL’s AR glasses give you a virtual cinema screen for Xbox Cloud Gaming, Netflix, PC gaming handhelds, and more

      July 7, 2025

      I’ve been using this Alienware 240Hz gaming monitor for 2 years — less than $1 a day if I’d bought it with this Prime Day discount

      July 7, 2025

      Final Fantasy IX Remake possibly cancelled according to latest rumors — Which may be the saddest way to celebrate this legendary game’s 25th anniversary

      July 7, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-48063 – XWiki Remote Code Execution via Required Rights Bypass

    CVE-2025-48063 – XWiki Remote Code Execution via Required Rights Bypass

    May 21, 2025

    CVE ID : CVE-2025-48063

    Published : May 21, 2025, 6:15 p.m. | 2 hours, 26 minutes ago

    Description : XWiki is a generic wiki platform. In XWiki 16.10.0, required rights were introduced as a way to limit which rights a document can have. Part of the security model of required rights is that a user who doesn’t have a right also cannot define that right as required right. That way, users who are editing documents on which required rights are enforced can be sure that they’re not giving a right to a script or object that it didn’t have before. A bug in the implementation of the enforcement of this rule means that in fact, it was possible for any user with edit right on a document to set programming right as required right. If then a user with programming right edited that document, the content of that document would gain programming right, allowing remote code execution. This thereby defeats most of the security benefits of required rights. As XWiki still performs the required rights analysis when a user edits a page even when required rights are enforced, the user with programming right would still be warned about the dangerous content unless the attacker managed to bypass this check. Note also that none of the affected versions include a UI for enabling the enforcing of required rights so it seems unlikely that anybody relied on them for security in the affected versions. As this vulnerability provides no additional attack surface unless all documents in the wiki enforce required rights, we consider the impact of this attack to be low even though gaining programming right could have a high impact. This vulnerability has been patched in XWiki 16.10.4 and 17.1.0RC1. No known workarounds are available except for upgrading.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-48064 – GitHub Desktop Windows Network Share Path Traversal Information Disclosure
    Next Article CVE-2025-48060 – jq Heap Buffer Overflow Vulnerability

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-42959 – Apache HMAC Reuse Replay Attack

    July 7, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-42953 – SAP Netweaver Privilege Escalation Vulnerability

    July 7, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-47512 – Tainacan Path Traversal

    Common Vulnerabilities and Exposures (CVEs)

    AI’s biggest surprises of 2024 | Unlocked 403 cybersecurity podcast (S2E1)

    Development

    CVE-2025-30101 – Dell PowerScale OneFS TOCTOU Race Condition Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    The Ten-Year Ascent: A Blueprint for Achieving Billionaire Status from Zero Capital

    Artificial Intelligence

    Highlights

    CVE-2025-41650 – Cisco Cmd Denial-of-Service Vulnerability

    May 27, 2025

    CVE ID : CVE-2025-41650

    Published : May 27, 2025, 9:15 a.m. | 4 hours, 5 minutes ago

    Description : An unauthenticated remote attacker can exploit input validation in cmd services of the devices, allowing them to disrupt system operations and potentially cause a denial-of-service.

    Severity: 7.5 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Build Products that Stick

    April 30, 2025

    CVE-2025-48375 – Schule Open-Source School Management System OTP Email Flooding Vulnerability

    May 23, 2025

    From The Editor’s Desk — new Windows Central community features, we’d like to hear from you!

    June 13, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.