Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      This week in AI dev tools: Gemini API Batch Mode, Amazon SageMaker AI updates, and more (July 11, 2025)

      July 11, 2025

      JFrog finds MCP-related vulnerability, highlighting need for stronger focus on security in MCP ecosystem

      July 11, 2025

      8 Key Questions Every CEO Should Ask Before Hiring a Node.js Development Company in 2025

      July 11, 2025

      Vibe Loop: AI-native reliability engineering for the real world

      July 10, 2025

      Most AI projects are abandoned – 5 ways to ensure your data efforts succeed

      July 13, 2025

      How agentic AI is transforming the very foundations of business strategy

      July 13, 2025

      The best Xbox and PC headset I’ve used for the last couple years is on sale

      July 12, 2025

      These 5 free add-ons make Minecraft Bedrock Edition feel brand new

      July 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 13, 2025
      Recent

      The details of TC39’s last meeting

      July 13, 2025

      new Date(“wtf”) – How well do you know JavaScript’s Date class?

      July 12, 2025

      Francisco Bergeret Paves the Way Through Strong Leadership at Perficient

      July 11, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Word for the Web Finally Gets Proper Header and Footer Editing

      July 13, 2025
      Recent

      Word for the Web Finally Gets Proper Header and Footer Editing

      July 13, 2025

      Windows 11 Build 27898 Adds Small Taskbar Icons, Quick Recovery, Smarter Sharing

      July 13, 2025

      Windows 11 Build 27898 Bug Brings Back Classic Vista Startup Sound, Again

      July 13, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-49581 – XWiki Macro Execution Arbitrary Code Execution Vulnerability

    CVE-2025-49581 – XWiki Macro Execution Arbitrary Code Execution Vulnerability

    June 13, 2025

    CVE ID : CVE-2025-49581

    Published : June 13, 2025, 4:15 p.m. | 1 hour, 51 minutes ago

    Description : XWiki is a generic wiki platform. Any user with edit right on a page (could be the user’s profile) can execute code (Groovy, Python, Velocity) with programming right by defining a wiki macro. This allows full access to the whole XWiki installation. The main problem is that if a wiki macro parameter allows wiki syntax, its default value is executed with the rights of the author of the document where it is used. This can be exploited by overriding a macro like the children macro that is used in a page that has programming right like the page XWiki.ChildrenMacro and thus allows arbitrary script macros. This vulnerability has been patched in XWiki 16.4.7, 16.10.3 and 17.0.0 by executing wiki parameters with the rights of the wiki macro’s author when the parameter’s value is the default value.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-6035 – GIMP Integer Overflow Vulnerability in Despeckle Plug-in
    Next Article CVE-2025-49580 – XWiki Cross-Site Scripting (XSS) Vulnerability

    Related Posts

    Development

    Critical Vulnerability in Anthropic’s MCP Exposes Developer Machines to Remote Exploits

    July 13, 2025
    Development

    Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials

    July 13, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    How effective is CBT for social anxiety?

    Web Development

    Eloquent Cast for HTML Strings in Laravel

    Development

    CVE-2025-6887 – Tenda AC5 Stack-Based Buffer Overflow Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    8 Venture Capital Firms Betting Big on Cybersecurity in 2025

    Web Development

    Highlights

    Linux Sudo chroot Vulnerability Enables Hackers to Elevate Privileges to Root

    July 1, 2025

    Linux Sudo chroot Vulnerability Enables Hackers to Elevate Privileges to Root

    A critical security vulnerability in the widely used Linux Sudo utility has been disclosed, allowing any local unprivileged user to escalate privileges to root access.
    Summary1. CVE-2025-32463 affects …
    Read more

    Published Date:
    Jul 01, 2025 (1 hour, 13 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2025-32463

    How to Register Models in Django Admin

    April 29, 2025

    Unlock retail intelligence by transforming data into actionable insights using generative AI with Amazon Q Business

    July 9, 2025

    Challenges and strategies of migrating a high-throughput relational database

    April 14, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.