Impact
XWiki Platform versions 1.8-rc-1, 17.0.0-rc-1, and 17.5.0-rc-1 and earlier allow REST API endpoints to enumerate every page, space, and object without imposing query limits. The resulting exhaustive list of metadata can consume excessive server CPU, memory, and I/O, eventually causing the service to become unresponsive. The issue’s weakness corresponds to Resource Exhaustion and can compromise availability, which is the primary impact for users of large wikis.
Affected Systems
The vulnerability targets xwiki-platform-legacy-oldcore and xwiki-platform-oldcore products from XWiki. It applies to releases up to and including 1.8-rc-1, 17.0.0-rc-1, and 17.5.0-rc-1. Patching versions 16.10.16, 17.4.8, and 17.10.1 removes the flaw, but older instances are still at risk.
Risk and Exploitability
The CVSS score is 6.9, indicating moderate severity. No EPSS score is reported, so exploitation likelihood is unknown, and the vulnerability is not currently recorded in the CISA KEV catalog. The attack vector is inferred to be remote over HTTP by an unauthenticated or authenticated user who can access REST endpoints; an attacker could trigger the exhaustive queries to deplete server resources.
OpenCVE Enrichment
Github GHSA