Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1691 | XWiki Platform is a generic wiki platform. Starting in version 5.4.4 and prior to versions 14.4.8, 14.10.4, and 15.0, a stored cross-site scripting vulnerability can be exploited by users with edit rights by adding a `AppWithinMinutes.FormFieldCategoryClass` class on a page and setting the payload on the page title. Then, any user visiting `/xwiki/bin/view/AppWithinMinutes/ClassEditSheet` executes the payload. The issue has been patched in XWiki 14.4.8, 14.10.4, and 15.0. As a workaround, update `AppWithinMinutes.ClassEditSheet` with a patch. |
Github GHSA |
GHSA-4wc6-hqv9-qc97 | XWiki Platform vulnerable to stored cross-site scripting in ClassEditSheet page via name parameters |
Fri, 29 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-29T14:27:48.189Z
Reserved: 2023-06-14T14:17:52.177Z
Link: CVE-2023-35153
Updated: 2024-08-02T16:23:59.219Z
Status : Modified
Published: 2023-06-23T18:15:13.970
Modified: 2024-11-21T08:08:02.750
Link: CVE-2023-35153
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA