
Author: CyberDudeBivash
Powered by: CyberDudeBivash Brand | cyberdudebivash.com
Related:cyberbivash.blogspot.com
Published by CyberDudeBivash • Date: Oct 31, 2025 (IST)
Your Infrastructure is at Risk: Hackers Are Actively Exploiting XWiki and VMware Flaws—Patch Immediately!
Actively exploited now: XWiki CVE-2025-24893 enables unauthenticated remote code execution via template/search parameter injection; VMware CVE-2025-41244 enables privilege escalation to root in environments running Aria Operations and VMware Tools (SDMP). Both are highlighted by CISA/analysts as in-the-wild. Patch, lock edges, and hunt immediately.CyberDudeBivash Ecosystem:Apps & Services · Threat Intel (Blogger) · CryptoBivash · News Portal · Subscribe: ThreatWire
TL;DR — Treat as Incidents, Patch Faster Than Usual
- XWiki CVE-2025-24893 (CVSS 9.8): Unauth RCE via template/search parameter injection. In the wild exploitation observed by multiple researchers; CISA KEV now flags it.
- VMware CVE-2025-41244 (CVSS 7.8): Priv-esc impacting Aria Operations/VMware Tools; exploitation tied to state-linked actors; patches released by Broadcom.
- Action: Patch to fixed builds, restrict risky endpoints, add WAF rules, and run the hunt playbooks below today.
Contents
- XWiki CVE-2025-24893 — What, Who, How
- VMware CVE-2025-41244 — What, Who, How
- Detections & Hunts (SIEM/EDR/Proxy)
- Emergency Mitigations & Patch Matrix
- Hardening Checklists
- FAQ
- Sources
XWiki CVE-2025-24893 — What, Who, How
Unauthenticated RCE via template injection in XWiki’s SolrSearch macro path lets remote attackers evaluate Groovy expressions. Exploitation has been captured by canary sensors and seen in public scanners; Metasploit/PoC write-ups are available, underscoring ease of abuse. Internet-facing XWiki must be patched or isolated immediately.
- Observed outcomes: webshell/coinminer deployment and lateral movement staging.
- Status: Added to CISA KEV; organizations urged to remediate quickly.
VMware CVE-2025-41244 — What, Who, How
Privilege escalation in Broadcom/VMware Aria Operations and VMware Tools (SDMP feature) allowing an attacker with low privileges on a guest/system to escalate to root. Analysts report zero-day exploitation dating back months; vendor shipped fixes across affected product lines. Track exposure across Cloud Foundation/Telco platforms as well.
- Threat activity: CISA and multiple outlets warn of active exploitation; attribution includes state-linked operators in some campaigns.
- Status: In CISA KEV; patches and guidance available from Broadcom.
Detections & Hunts (SIEM/EDR/Proxy)
XWiki — Web/Proxy/Host Hunts
- Proxy logs: Atypical
GET/POSTto XWiki search endpoints carrying Groovy-like payloads or encoded expressions; sudden spikes of 500/503 before webshell drop. - Filesystem: Newly created
.groovy/.jspor suspicious files under/xwiki/or temp dirs; integrity drift of templates. - Process tree: App server child processes (e.g.,
javaspawningsh/bash) with outbound connections.
VMware — Platform/Guest Hunts
- Auth/priv spikes: Sudden elevation of low-priv accounts on Aria Ops hosts; unexpected
sudo/setuidactivity. - SDMP traces: Look for suspicious interactions with guest service discovery/SDMP components around crash or restart events.
- IOC correlation: Cross-check CISA KEV items and vendor bulletins for indicators tied to CVE-2025-41244 campaigns.
# Proxy hunt idea (XWiki)
zgrep -E "(/xwiki/.*search|SolrSearch|suggest)" access.log* | grep -Ei "(%7B|%24|groovy|eval|script)"
# Linux: suspicious child process of java (Tomcat/Jetty)
ps -eo ppid,pid,user,cmd | awk '$4 ~ /java/ {print}' ; journalctl -u tomcat* --since "24 hours ago" | grep -Ei "exec|bash|curl|wget"
Emergency Mitigations & Patch Matrix
Immediate Edge/WAF Guardrails
# Block risky XWiki search/template injection patterns (concept)
if path matches /(SolrSearch|search)/ and request contains /(groovy|\\$\\{|%24%7B)/ then block(403)
XWiki — Patch & Validate
- Patch to vendor-fixed builds for CVE-2025-24893; review release notes and disable unsafe template evaluation paths.
- Validate: Re-hash templates, scan for webshells, rotate app secrets, and enforce least-priv on the app server.
- Isolation: If patching is delayed, remove public exposure; restrict to VPN/Zero-Trust proxy.
VMware — Patch & Validate
- Apply Broadcom updates for Aria Operations, Tools (and Cloud Foundation/Telco where applicable) that remediate CVE-2025-41244.
- Validate: Confirm new package versions; review SDMP configuration; monitor for privilege anomalies post-patch.
- Credential/token hygiene: Rotate credentials on impacted hosts; review recent admin actions.
Hardening Checklists
- Zero-trust edges: Put admin APIs and risky endpoints behind mTLS/JWT-aware proxies; no direct internet exposure.
- Exploit chain breaks: WDAC/AppLocker (Windows) or eBPF/Selinux profiles (Linux) to restrict interpreter spawns from app servers.
- Observability: Dedicated dashboards for XWiki search errors and Aria Ops privilege events; alert on template edits and SDMP activity.
- Backups & DR: Verified, offline backups of XWiki data and Aria Ops configs; practice restore runbooks quarterly.
FAQ
Are these confirmed “actively exploited” today?
Yes. CISA expanded KEV to include XWiki CVE-2025-24893 and VMware CVE-2025-41244, with additional analyst reporting of in-the-wild activity (including earlier zero-day use for the VMware issue).
What does the XWiki bug allow?
Unauthenticated RCE via template/parameter injection (SolrSearch macro). Multiple public analyses and modules describe the attack path.
What does the VMware bug allow?
Local privilege escalation to root in Aria Operations/Tools contexts where SDMP is enabled; vendor updates are available.
Sources
- SecurityWeek — CISA adds exploited XWiki & VMware flaws (KEV update).
- VulnCheck — XWiki CVE-2025-24893 Exploited in the Wild (canary capture, IoCs).
- OffSec — Deep dive on CVE-2025-24893 unauth RCE.
- Rapid7 Metasploit module — XWiki unauth RCE usage notes.
- Broadcom/Qualys/CIS advisories — VMware CVE-2025-41244 details & patches.
- CISA Alerts — KEV additions & exploitation notes.
CyberDudeBivash — Services, Apps & Ecosystem
- Emergency Patch Sprints (Web, VMware, Linux/Windows)
- Threat Hunts (XWiki RCE chains, Aria Ops/Tools priv-esc)
- WAF/Zero-Trust Edge Engineering & Log Pipelines
Apps & Products · Consulting & Services · ThreatWire Newsletter · CyberBivash (Threat Intel) · News Portal · CryptoBivash
Ecosystem: cyberdudebivash.com | cyberbivash.blogspot.com | cryptobivash.code.blog | cyberdudebivash-news.blogspot.com | ThreatWire
Author: CyberDudeBivash • Powered by CyberDudeBivash • © 2025
#CyberDudeBivash #CyberBivash #XWiki #CVE202524893 #VMware #CVE202541244 #RCE #PrivilegeEscalation #CISAKEV #ThreatWire
Leave a comment