CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-32969
9.825.20%

HQL Hell: Breaking XWiki with a Single Quote and a Dream

Alon Barad
Alon Barad
Software Engineer

Jan 3, 2026·7 min read·24 visits

Weaponized

Executive Summary (TL;DR)

XWiki exposed a REST endpoint that accepts HQL queries. Due to a flaw in how 'short-form' queries were validated versus how they were executed, attackers can escape the HQL context. This results in unauthenticated Blind SQL Injection, leading to full database compromise and potential RCE. Rated CVSS 9.8.

A critical unauthenticated HQL injection vulnerability in XWiki's REST API allows attackers to break out of the Hibernate Query Language abstraction and execute raw SQL on the underlying database.

Official Patches

XWikiGitHub Commit fixing the vulnerability
XWikiJira Issue Tracking

Fix Analysis (1)

Technical Appendix

CVSS Score
9.8/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
25.20%
Top 4% most exploited
5,000
Estimated exposed hosts via Shodan

Affected Systems

XWiki Platform < 15.10.16XWiki Platform 16.0.0-rc-1 to < 16.4.6XWiki Platform 16.5.0-rc-1 to < 16.10.1

Affected Versions Detail

Product
Affected Versions
Fixed Version
XWiki Platform
XWiki
1.8 - < 15.10.1615.10.16
XWiki Platform
XWiki
16.0.0 - < 16.4.616.4.6
XWiki Platform
XWiki
16.5.0 - < 16.10.116.10.1
AttributeDetail
CWE IDCWE-89 (SQL Injection)
Attack VectorNetwork (REST API)
CVSS v3.19.8 (Critical)
CVSS v4.09.3 (Critical)
EPSS Score25.20%
EPSS Percentile96th Percentile
Exploit StatusPoC Available
ImpactConfidentiality, Integrity, Availability

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1059Command and Scripting Interpreter
Execution
T1505Server Software Component
Persistence
CWE-89
SQL Injection

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Known Exploits & Detection

NucleiTime-based SQL injection template utilizing the sleep function
NucleiDetection Template Available

Vulnerability Timeline

Fix committed to GitHub repository
2024-12-06
Public Disclosure / GHSA Published
2025-04-23
Nuclei Template Verified
2025-08-28

References & Sources

  • [1]GHSA Advisory
  • [2]NVD Detail

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.