XWiki-Platform - Path Traversal (CVE-2025-55747)
57Exploiting IPs reported
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 6.1-milestone-2 through 16.10.6, configuration files are accessible through the webjars API. This is fixed in version 16.10.7.
CrowdSec analysis
CVE-2025-55747 is a critical vulnerability in XWiki Platform versions 6.1-milestone-2 through 16.10.6, where configuration files are exposed via the webjars API. This flaw allows unauthenticated remote attackers to access sensitive configuration data, potentially leading to further compromise of the application or underlying infrastructure.
CrowdSec has been tracking this vulnerability and its exploits since 26th of November 2025.
CrowdSec network data shows that most actors exploiting CVE-2025-55747 rely on broad, untargeted scans with minimal filtering. The activity is largely automated and opportunistic in nature. Data from the CrowdSec community also indicates a gradual decrease in attacks targeting CVE-2025-55747. While still present in the wild, exploitation levels have dropped noticeably week-over-week. This may signal that the vulnerability is becoming less relevant or that defenses are improving fast enough for attackers to lose interest.
Attackers exploit the /xwiki/webjars/ endpoint with encoded directory traversal sequences (e.g., %2F..%2F..%2F..%2F..%2FWEB-INF%2Fxwiki.cfg) to access sensitive configuration files such as xwiki.cfg.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.