Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

XWiki Vulnerability Exploited in Cryptocurrency Mining Operation

Posted on October 29, 2025October 29, 2025 By CWS

A critical-severity vulnerability within the common open supply enterprise wiki platform XWiki has been exploited within the wild as a part of a low-end cryptocurrency mining operation, VulnCheck studies.

The difficulty, tracked as CVE-2025-24893 (CVSS rating of 9.8), permits attackers to execute arbitrary code remotely, by sending a request to the SolrSearch macro, which makes use of the embedded Solr engine for full-text search.

As a result of the macro improperly sanitizes search parameters in Groovy, a distant, unauthenticated attacker can craft search requests and inject malicious code that can be executed with the privileges of the online server.

“The particular flaw exists inside the dealing with of the textual content parameter offered to the SolrSearchMacros endpoint. The difficulty outcomes from the dearth of correct validation of a user-supplied string earlier than utilizing it to execute a system name. An attacker can leverage this vulnerability to execute code within the context of the service account,” a ZDI advisory reads.

Profitable exploitation of the flaw permits attackers to show delicate data, disrupt survey operations, or execute arbitrary system instructions with the privileges of the consumer operating the online server.

The safety defect was reported by Development Micro’s John Kwak in Could 2024, and was addressed in XWiki variations 15.10.11, 16.4.1 and 16.5.0RC1, in June 2024.

Technical particulars on the bug emerged roughly half a yr later and an NVD advisory was revealed in February. Quite a few proof-of-concept (PoC) exploits concentrating on it have been out there since early 2025.

CrowdSec earlier this yr noticed the vulnerability being abused for reconnaissance, however famous a decline in exercise surrounding it. Now, VulnCheck says it has recognized in-the-wild assaults exploiting CVE-2025-24893 to deploy a cryptocurrency miner.Commercial. Scroll to proceed studying.

“We noticed a number of exploit makes an attempt towards our XWiki canaries coming from an attacker geolocated in Vietnam. The exploitation proceeds in a two-pass workflow separated by not less than 20 minutes: the primary go phases a downloader (writes a file to disk), and the second go later executes it,” VulnCheck notes.

The assaults, VulnCheck says, look like a part of a low-end crypto mining operation, and the noticed site visitors originates from an IP tackle that has been related to different malicious exercise as nicely.

Associated: CISA Warns of Exploited DELMIA Manufacturing unit Software program Vulnerabilities

Associated: QNAP NetBak PC Agent Affected by Current ASP.NET Core Vulnerability

Associated: Crucial Home windows Server WSUS Vulnerability Exploited within the Wild

Associated: CISA Warns of Exploited Apple, Kentico, Microsoft Vulnerabilities

Security Week News Tags:Cryptocurrency, Exploited, Mining, Operation, Vulnerability, XWiki

Post navigation

Previous Post: Ad and PR Giant Dentsu Says Hackers Stole Merkle Data
Next Post: Windows Accessibility Flaw Allows Stealthy Persistence and Lateral Movement via Narrator DLL Hijack

Related Posts

Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities Security Week News
In Other News: Microsoft Finds AMD CPU Flaws, ZuRu macOS Malware Evolves, DoNot APT Targets Govs Security Week News
In Other News: PQC Adoption, New Android Spyware, FEMA Data Breach Security Week News
US Storms 29 Laptop Farms in Crackdown on North Korean IT Worker Schemes Security Week News
160,000 Impacted by Valsoft Data Breach Security Week News
1Kosmos Raises $57 Million for Identity Verification and Authentication Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators
  • Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure
  • LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS
  • Hackers Can Manipulate Internet-Based Solar Panel Systems to Execute Attacks in Minutes
  • From Open Source to OpenAI: The Evolution of Third-Party Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators
  • Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure
  • LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS
  • Hackers Can Manipulate Internet-Based Solar Panel Systems to Execute Attacks in Minutes
  • From Open Source to OpenAI: The Evolution of Third-Party Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark