XWiki Jetty Package (XJetty) allows accessing any application file through URL
Package
Affected versions
>= 16.7.0, < 16.10.11
>= 17.0.0-rc-1, < 17.4.4
>= 17.5.0, < 17.7.0
Patched versions
16.10.11
17.4.4
17.7.0
Description
Published to the GitHub Advisory Database
Dec 1, 2025
Reviewed
Dec 1, 2025
Published by the National Vulnerability Database
Dec 1, 2025
Last updated
Dec 2, 2025
Impact
In an instance which is using the XWiki Jetty package (XJetty), a context is exposed to statically access any file located in the webapp/ folder.
It allows accessing files which might contains credentials, like http://myhots/webapps/xwiki/WEB-INF/xwiki.cfg, http://myhots/webapps/xwiki/WEB-INF/xwiki.properties or http://myhots/webapps/xwiki/WEB-INF/hibernate.cfg.xml.
Patches
This has been patched in 16.10.11, 17.4.4, 17.7.0.
Workarounds
The workaround is to modify the start_xwiki.sh script following xwiki/xwiki-platform@8b68d8a...99a04a0.
For more information
If you have any questions or comments about this advisory:
Attribution
Vulnerability reported by Joseph Huber.
References