CrowdSec
2/10CrowdSec Score

XWiki-Platform - Path Traversal (CVE-2025-55747)

Published on03-09-2025
First seen on27-12-2025
Public ExploitCVSS 9.3/10XWiki - XWiki-Platform

57Exploiting IPs reported

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 6.1-milestone-2 through 16.10.6, configuration files are accessible through the webjars API. This is fixed in version 16.10.7.

CrowdSec analysis

CVE-2025-55747 is a critical vulnerability in XWiki Platform versions 6.1-milestone-2 through 16.10.6, where configuration files are exposed via the webjars API. This flaw allows unauthenticated remote attackers to access sensitive configuration data, potentially leading to further compromise of the application or underlying infrastructure.

CrowdSec has been tracking this vulnerability and its exploits since 26th of November 2025.

CrowdSec network data shows that most actors exploiting CVE-2025-55747 rely on broad, untargeted scans with minimal filtering. The activity is largely automated and opportunistic in nature. Data from the CrowdSec community also indicates a gradual decrease in attacks targeting CVE-2025-55747. While still present in the wild, exploitation levels have dropped noticeably week-over-week. This may signal that the vulnerability is becoming less relevant or that defenses are improving fast enough for attackers to lose interest.

Attackers exploit the /xwiki/webjars/ endpoint with encoded directory traversal sequences (e.g., %2F..%2F..%2F..%2F..%2FWEB-INF%2Fxwiki.cfg) to access sensitive configuration files such as xwiki.cfg.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.