top of page

RondoDox Exploits Unpatched XWiki Servers to Pull ... - Cybrr

  • Nov 16, 2025
  • 2 min read

Key Findings:


  • RondoDox botnet malware is targeting unpatched XWiki instances to exploit a critical remote code execution vulnerability (CVE-2025-24893).

  • The vulnerability, with a CVSS score of 9.8, allows any guest user to execute arbitrary code through a request to the "/bin/get/Main/SolrSearch" endpoint.

  • The flaw was patched by XWiki in versions 15.10.11, 16.4.1, and 16.5.0RC1 released in late February 2025.

  • Evidence shows the vulnerability has been exploited in the wild since at least March 2025.

  • The U.S. CISA has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, requiring federal agencies to apply necessary mitigations by November 20.

  • VulnCheck has observed a spike in exploitation attempts, with a new high on November 7 and another surge on November 11, indicating broader scanning and exploitation by multiple threat actors.

  • RondoDox is one of the threat actors observed exploiting the flaw to add new devices to its botnet for conducting distributed denial-of-service (DDoS) attacks.


Background


The vulnerability in question, CVE-2025-24893, is an eval injection bug in the XWiki platform that could allow any guest user to perform arbitrary remote code execution. The flaw was discovered and patched by the XWiki maintainers in late February 2025, but exploitation in the wild has been observed since at least March 2025.


Exploitation by RondoDox Botnet


VulnCheck's analysis reveals that the RondoDox botnet has been actively exploiting the CVE-2025-24893 vulnerability to add new devices to its infrastructure. The first RondoDox exploit was observed on November 3, 2025, as part of the botnet's efforts to expand its reach.


Other Exploitation Attempts


In addition to RondoDox, VulnCheck has also observed other threat actors exploiting the vulnerability for various malicious purposes, including:


  • Delivery of cryptocurrency miners

  • Establishing reverse shells

  • General probing activity using a Nuclei template for CVE-2025-24893


Importance of Timely Patching


The findings highlight the need for organizations to maintain robust patch management practices to ensure timely application of security updates. The rapid adoption of this vulnerability by multiple threat actors, including botnets, miners, and opportunistic scanners, underscores the importance of addressing such high-severity flaws as soon as possible.


Sources


  • https://thehackernews.com/2025/11/rondodox-exploits-unpatched-xwiki.html

  • https://techjacksolutions.com/rondodox-exploits-unpatched-xwiki-servers-to-pull-more-devices-into-its-botnetthe-hacker-newsinfothehackernews-com-the-hacker-news/

  • https://www.reddit.com/r/InfoSecNews/comments/1oy6w9x/rondodox_exploits_unpatched_xwiki_servers_to_pull/

  • https://x.com/TheCyberSecHub/status/1989734194533253137

  • https://www.cypro.se/2025/11/15/rondodox-exploits-unpatched-xwiki-servers-to-pull-more-devices-into-its-botnet/

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page