Tech »  Topic »  XWiki Remote Code Execution Flaw Actively Weaponized for Coinmining

XWiki Remote Code Execution Flaw Actively Weaponized for Coinmining


A critical security vulnerability in XWiki collaboration software is being actively exploited by threat actors to deploy cryptocurrency mining malware on vulnerable systems.

The flaw, tracked as CVE-2025-24893, represents a serious threat to organizations running unpatched XWiki installations.

Cybersecurity researchers at VulnCheck have captured concrete evidence of active exploitation through their canary network.

CVE Details Information
CVE ID CVE-2025-24893
Vulnerability Type Unauthenticated Remote Template Injection
Affected Product XWiki
Severity Critical

The attacks originate from Vietnam-based threat actors who employ a sophisticated two-stage attack methodology.

The initial exploitation occurs through XWiki’s SolrSearch endpoint, where attackers inject malicious code via a template injection vulnerability that requires no authentication.

The attack begins when hackers send a crafted request to the vulnerable endpoint, using URL-encoded parameters to execute remote commands.

The first stage downloads a small bash script from a command-and-control server located at IP address 193.32.208.24, which hosts malicious ...


Copyright of this story solely belongs to gbhackers . To see the full text click HERE