Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Actively Scanning Internet to Exploit XWiki Remote Code Execution Vulnerability

Posted on November 4, 2025November 4, 2025 By CWS

A important distant code execution vulnerability affecting XWiki’s SolrSearch part has grow to be the goal of widespread exploitation makes an attempt, prompting cybersecurity authorities so as to add it to their watchlist.

The flaw permits attackers with minimal visitor privileges to execute arbitrary instructions on susceptible programs, posing a big safety danger to organizations utilizing this open-source enterprise wiki platform.

XWiki, which positions itself as a sophisticated open-source enterprise wiki and various to platforms like Confluence and MediaWiki, launched a safety advisory and patch in February addressing this extreme vulnerability.

The flaw resides within the SolrSearch part and remarkably requires solely guest-level privileges for exploitation, making it accessible to nearly any consumer with fundamental system entry.

Vulnerability Discovery and Delayed Exploitation

The early launch of proof-of-concept code alongside the advisory meant that the vulnerability skilled an unusually delayed exploitation timeline. Preliminary reconnaissance scans appeared in July, however precise exploitation makes an attempt didn’t surge till just lately.

The exploitation technique demonstrates comparatively easy execution patterns. Attackers ship specifically crafted GET requests to the susceptible XWiki endpoint, particularly concentrating on the SolrSearch RSS media operate.

SANS noticed that the malicious requests embed Groovy script instructions inside asynchronous execution blocks, permitting distant code execution via shell instructions.

Captured exploit makes an attempt reveal attackers making an attempt to obtain and execute shell scripts from exterior servers, particularly from the IP tackle 74.194.191.52.

The Person-Agent string in these requests incorporates the e-mail tackle [email protected], doubtlessly belonging to the risk actor.

Investigation of the internet hosting server uncovered an sudden connection to Chicago rap tradition, with references to captivity rapper King Lil Jay and rival RondoNumbaNine, each beforehand related to opposing gang affiliations.

The vulnerability presents important dangers as a result of it permits full system compromise via distant code execution capabilities. Organizations operating XWiki installations should prioritize fast patching to stop potential breaches.

The assault requires no consumer interplay and minimal complexity, making it significantly engaging to opportunistic risk actors conducting mass web scanning campaigns.

Safety groups ought to confirm their XWiki installations are up to date with the February safety patch, monitor for suspicious SolrSearch requests, and implement network-level protections to detect exploitation makes an attempt.

The mix of low assault complexity and widespread scanning exercise signifies this vulnerability will stay a high-priority goal for malicious actors.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Actively, Code, Execution, Exploit, Hackers, Internet, Remote, Scanning, Vulnerability, XWiki

Post navigation

Previous Post: Critical Android 0-Click Vulnerability in System Component Allows RCE Attacks
Next Post: Zscaler Acquires AI Security Company SPLX

Related Posts

GitGuardian Launches MCP Server to Bring Secrets Security into Developer Workflows Cyber Security News
PoC Published For Fortinet 0-Day Vulnerability That Being Exploited in the Wild Cyber Security News
Critical runc Vulnerabilities Put Docker and Kubernetes Container Isolation at Risk Cyber Security News
Multiple Ivanti Endpoint Manager Vulnerabilities Allows Remote Code Execution Cyber Security News
Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks Cyber Security News
Hackers Replace ‘m’ with ‘rn’ in Microsoft(.)com to Steal Users’ Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Teams Down – Users Face Messaging Delays and Service Disruptions Worldwide
  • Thailand Conference Launches International Initiative to Fight Online Scams
  • 25,000+ FortiCloud SSO-Enabled Devices Exposed to Remote Attacks
  • Criminal IP and Palo Alto Networks Cortex XSOAR Integrate to Deliver AI-Driven Exposure Intelligence
  • BlueDelta Hackers Attacking Users of Widely Used Ukrainian Webmail and News Service

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Teams Down – Users Face Messaging Delays and Service Disruptions Worldwide
  • Thailand Conference Launches International Initiative to Fight Online Scams
  • 25,000+ FortiCloud SSO-Enabled Devices Exposed to Remote Attacks
  • Criminal IP and Palo Alto Networks Cortex XSOAR Integrate to Deliver AI-Driven Exposure Intelligence
  • BlueDelta Hackers Attacking Users of Widely Used Ukrainian Webmail and News Service

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark