CISA Confirms Active Exploitation of Critical Vulnerabilities in Dassault and XWiki

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has officially confirmed that threat actors are actively exploiting critical security vulnerabilities in two widely used enterprise platforms: Dassault Systèmes’ DELMIA Apriso and the open-source XWiki. These flaws grant attackers the ability to execute arbitrary code and seize control of affected systems, prompting urgent calls for patching.

The Critical Vulnerabilities at a Glance

CISA has added these specific vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies to address them promptly. The flaws present a severe risk to organizational security.

  • CVE-2025-6205 (CVSS: 9.1): A critical missing authorization flaw in Dassault DELMIA Apriso that allows an unauthenticated attacker to gain privileged application access.
  • CVE-2025-6204 (CVSS: 8.0): A code injection vulnerability in the same Dassault product, enabling arbitrary code execution on the underlying server.
  • CVE-2025-24893 (CVSS: 9.8): A critical eval injection vulnerability in XWiki that permits any guest user to achieve remote code execution via a specific endpoint (/bin/get/Main/SolrSearch).

The Dassault DELMIA Apriso Threat Chain

The two Dassault vulnerabilities, affecting versions from 2020 through 2025, form a potent one-two punch. Researchers from ProjectDiscovery detailed how attackers can chain these flaws together for a complete system takeover.

The exploit chain works as follows:

  1. Attackers first abuse the authorization flaw (CVE-2025-6205) to create user accounts with elevated privileges.
  2. They then leverage the code injection bug (CVE-2025-6204) to upload and execute malicious files within a web-served directory.

This combination results in a full compromise of the DELMIA Apriso application. Dassault Systèmes released patches for these issues in early August 2025.

attacker-hosting

 A Recurring Problem

This marks the second time in just over a month that CISA has flagged active attacks against the DELMIA Apriso platform. A previous critical flaw, CVE-2025-5086, was also added to the KEV catalog after exploitation was detected in the wild, raising questions about the scope of these ongoing campaigns.

XWiki Under Attack: A Stealthy Crypto-Miner Operation

Simultaneously, a critical vulnerability in XWiki (CVE-2025-24893) is being aggressively exploited in a calculated, two-stage attack to deploy cryptocurrency mining software.

According to VulnCheck, which first detected the exploitation, the attacks originate from an IP address in Vietnam (123.25.249[.]88). The process is deliberately slow to avoid detection.

The Two-Pass Attack Workflow

  • First Pass: The attacker exploits the vulnerability to stage a downloader on the XWiki server, writing a file to the disk.
  • Second Pass: After a delay of at least 20 minutes, a second exploit triggers the downloader, which retrieves the main payloads.

The payloads perform distinct functions:

  1. Payload x521: Fetches the actual cryptocurrency miner from the attacker-controlled server 193.32.208[.]24:8080.
  2. Payload x522: Acts as a “killer script,” terminating competing miners like XMRig and Kinsing to ensure maximum resource allocation for the attacker’s own miner, which is configured for the c3pool.org mining pool.