Description
XWiki Platform is a generic wiki platform. Starting in versions 2.2-milestone-1 and prior to versions 14.4.8, 14.10.4, and 15.0-rc-1, it's possible to execute javascript with the right of any user by leading him to a special URL on the wiki targeting a page which contains an attachment. This has been patched in XWiki 15.0-rc-1, 14.10.4, and 14.4.8. The easiest possible workaround is to edit file `<xwiki app>/templates/importinline.vm` and apply the modification described in commit 28905f7f518cc6f21ea61fe37e9e1ed97ef36f01.
Published: 2023-05-09
Score: 9.1 Critical
EPSS: 30.1% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-j9h5-vcgv-2jfm XWiki Platform vulnerable to RXSS via editor parameter - importinline template
History

Tue, 28 Jan 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-01-28T16:36:40.254Z

Reserved: 2023-05-01T16:47:35.314Z

Link: CVE-2023-32071

cve-icon Vulnrichment

Updated: 2024-08-02T15:03:28.748Z

cve-icon NVD

Status : Modified

Published: 2023-05-09T16:15:15.297

Modified: 2024-11-21T08:02:39.280

Link: CVE-2023-32071

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses