In an instance which is using the XWiki Jetty package (XJetty), a context is exposed to statically access any file located in the webapp/ folder.
It allows accessing files which might contains credentials, like http://myhots/webapps/xwiki/WEB-INF/xwiki.cfg, http://myhots/webapps/xwiki/WEB-INF/xwiki.properties or http://myhots/webapps/xwiki/WEB-INF/hibernate.cfg.xml.
This has been patched in 16.10.11, 17.4.4, 17.7.0.
The workaround is to modify the start_xwiki.sh script following https://github.com/xwiki/xwiki-platform/compare/8b68d8a70b43f25391b3ee48477d7eb71b95cf4b...99a04a0e2143583f5154a43e02174155da7e8e10.
If you have any questions or comments about this advisory: * Open an issue in Jira XWiki.org * Email us at Security Mailing List
Vulnerability reported by Joseph Huber.
{
"severity": "HIGH",
"github_reviewed": true,
"cwe_ids": [
"CWE-284"
],
"nvd_published_at": "2025-12-01T21:15:51Z",
"github_reviewed_at": "2025-12-01T18:59:29Z"
}