Have you ever thought about how a simple bug on your server can allow hackers take control of everything? The same thinking moment occurred to me when I read that the
RondoDox botnet, which is obvious, is utilizing a major
XWiki security flaw. I have been a server operator for a number of years, and this is the kind of flaw that will force you to fix the problems immediately.
What Is The XWiki Flaw and How Do Hackers Use It?
The bug is a major security bug called
CVE-2025-24893, and it allows attackers to run code on your server without logging in .
Here is how they do it:
- They scan open XWiki servers on the Internet.
- They issue a GET request to /bin/get/Main/SolrSearch.
- The GET request contains base64 Groovy code to execute a shell script.
- The script then downloads the RondoDox malware.
- Then your server becomes part of a botnet to mine cryptocoins, launch DDoS attacks, or spread to additional machines.
It’s fast, sneaky, and incredibly dangerous.
Why This Vulnerability Is Severe
Some bugs can often be inadequately rated, but this one quite literally has a
CVSS score of
9.8. So, this is about as serious as it gets!
Here’s why you should stop putting this off:
- Hackers don’t need a password to exploit this bug.
- Public exploit code is now available.
- Attackers, including the RondoDox botnet, have already targeted this bug.
If you’re running
XWiki and you have not updated, then your server is at risk.
What To Do Next
Here’s an easy checklist for you to follow:
- Verify your version of XWiki. You need a version of either 15.10.11 or 16.4.1 or later.
- Update as soon as possible - delay no further!
- Monitor your logs for strange requests hitting /bin/get/Main/SolrSearch.
- Watch for any unknown running or crypto mining tools, and remove from your systems.
- Block known bad IPs and domains associated with the RondoDox botnet in your firewall.
Final thoughts
The
RondoDox botnet is exploiting this
XWiki vulnerability to effortlessly penetrate servers. The attack itself is simple, automated, and already present on the internet. If using
XWiki, please patch it immediately if you have any inkling that you are vulnerable. In a matter of minutes today, you can depend on a future headache.