CVE-2025-32969

HQL Hell: Breaking XWiki with a Single Quote and a Dream

Alon Barad
Alon Barad
Software Engineer

Jan 3, 2026·7 min read·19 visits

Executive Summary (TL;DR)

XWiki exposed a REST endpoint that accepts HQL queries. Due to a flaw in how 'short-form' queries were validated versus how they were executed, attackers can escape the HQL context. This results in unauthenticated Blind SQL Injection, leading to full database compromise and potential RCE. Rated CVSS 9.8.

A critical unauthenticated HQL injection vulnerability in XWiki's REST API allows attackers to break out of the Hibernate Query Language abstraction and execute raw SQL on the underlying database.

Fix Analysis (1)

Technical Appendix

CVSS Score
9.8/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
25.20%
Top 4% most exploited
5,000
via Shodan

Affected Systems

XWiki Platform < 15.10.16XWiki Platform 16.0.0-rc-1 to < 16.4.6XWiki Platform 16.5.0-rc-1 to < 16.10.1

Affected Versions Detail

Product
Affected Versions
Fixed Version
XWiki Platform
XWiki
1.8 - < 15.10.1615.10.16
XWiki Platform
XWiki
16.0.0 - < 16.4.616.4.6
XWiki Platform
XWiki
16.5.0 - < 16.10.116.10.1
AttributeDetail
CWE IDCWE-89 (SQL Injection)
Attack VectorNetwork (REST API)
CVSS v3.19.8 (Critical)
CVSS v4.09.3 (Critical)
EPSS Score25.20%
EPSS Percentile96th Percentile
Exploit StatusPoC Available
ImpactConfidentiality, Integrity, Availability
CWE-89
SQL Injection

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Vulnerability Timeline

Fix committed to GitHub repository
2024-12-06
Public Disclosure / GHSA Published
2025-04-23
Nuclei Template Verified
2025-08-28