• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 56000 (56k) monthly views (unique) and 285135 clicks per month, as per Google Analytics! Thank you for your support! 🎉

RondoDox Botnet Malware Attacks Servers Through XWiki Bug

johny899

New Member
Content Writer
Messages
838
Reaction score
3
Points
23
Balance
$1,025.7USD
Have you ever thought about how a simple bug on your server can allow hackers take control of everything? The same thinking moment occurred to me when I read that the RondoDox botnet, which is obvious, is utilizing a major XWiki security flaw. I have been a server operator for a number of years, and this is the kind of flaw that will force you to fix the problems immediately.

What Is The XWiki Flaw and How Do Hackers Use It?​

The bug is a major security bug called CVE-2025-24893, and it allows attackers to run code on your server without logging in .

Here is how they do it:
  • They scan open XWiki servers on the Internet.
  • They issue a GET request to /bin/get/Main/SolrSearch.
  • The GET request contains base64 Groovy code to execute a shell script.
  • The script then downloads the RondoDox malware.
  • Then your server becomes part of a botnet to mine cryptocoins, launch DDoS attacks, or spread to additional machines.
It’s fast, sneaky, and incredibly dangerous.

Why This Vulnerability Is Severe​

Some bugs can often be inadequately rated, but this one quite literally has a CVSS score of 9.8. So, this is about as serious as it gets!

Here’s why you should stop putting this off:
  • Hackers don’t need a password to exploit this bug.
  • Public exploit code is now available.
  • Attackers, including the RondoDox botnet, have already targeted this bug.
If you’re running XWiki and you have not updated, then your server is at risk.

What To Do Next​

Here’s an easy checklist for you to follow:
  • Verify your version of XWiki. You need a version of either 15.10.11 or 16.4.1 or later.
  • Update as soon as possible - delay no further!
  • Monitor your logs for strange requests hitting /bin/get/Main/SolrSearch.
  • Watch for any unknown running or crypto mining tools, and remove from your systems.
  • Block known bad IPs and domains associated with the RondoDox botnet in your firewall.

Final thoughts​

The RondoDox botnet is exploiting this XWiki vulnerability to effortlessly penetrate servers. The attack itself is simple, automated, and already present on the internet. If using XWiki, please patch it immediately if you have any inkling that you are vulnerable. In a matter of minutes today, you can depend on a future headache.
 
Top