Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54677 | XWiki allows SQL injection in query endpoint of REST API with Oracle |
Github GHSA |
GHSA-prwh-7838-xf82 | XWiki allows SQL injection in query endpoint of REST API with Oracle |
Mon, 12 Jan 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 03 Sep 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xwiki xwiki
|
|
| CPEs | cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Xwiki xwiki
|
|
| Metrics |
cvssV3_1
|
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 12 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Jun 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | XWiki is a generic wiki platform. It's possible to execute any SQL query in Oracle by using the function like DBMS_XMLGEN or DBMS_XMLQUERY. The XWiki query validator does not sanitize functions that would be used in a simple select and Hibernate allows using any native function in an HQL query. This vulnerability is fixed in 16.10.2, 16.4.7, and 15.10.16. | |
| Title | XWiki allows SQL injection in query endpoint of REST API with Oracle | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-12T14:43:46.541Z
Reserved: 2024-12-17T18:16:49.853Z
Link: CVE-2024-56158
Updated: 2025-06-12T15:23:18.890Z
Status : Modified
Published: 2025-06-12T15:15:38.967
Modified: 2026-01-12T15:16:01.537
Link: CVE-2024-56158
No data.
OpenCVE Enrichment
Updated: 2025-06-24T09:51:38Z
EUVD
Github GHSA