Hackers Actively Scanning Internet to Exploit XWiki Remote Code Execution Vulnerability

Hackers Actively Scanning Internet to Exploit XWiki Remote Code Execution Vulnerability

A critical remote code execution vulnerability affecting XWiki’s SolrSearch component has become the target of widespread exploitation attempts, prompting cybersecurity authorities to add it to their watchlist.

The flaw allows attackers with minimal guest privileges to execute arbitrary commands on vulnerable systems, posing a significant security risk to organizations using this open-source enterprise wiki platform.

XWiki, which positions itself as an advanced open-source enterprise wiki and alternative to platforms like Confluence and MediaWiki, released a security advisory and patch in February addressing this severe vulnerability.

The flaw resides in the SolrSearch component and remarkably requires only guest-level privileges for exploitation, making it accessible to virtually any user with basic system access.

Vulnerability Discovery and Delayed Exploitation

The early release of proof-of-concept code alongside the advisory meant that…