Description
XWiki Platform is a generic wiki platform. Starting in version 3.1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, it is possible to schedule/trigger/unschedule existing jobs by having an admin visit the Job Scheduler page through a predictable URL, for example by embedding such an URL in any content as an image. The vulnerability has been fixed in XWiki 14.10.19, 15.5.5, and 15.9. As a workaround, manually apply the patch by modifying the `Scheduler.WebHome` page.
Published: 2024-04-10
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-1223 XWiki Platform is a generic wiki platform. Starting in version 3.1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, it is possible to schedule/trigger/unschedule existing jobs by having an admin visit the Job Scheduler page through a predictable URL, for example by embedding such an URL in any content as an image. The vulnerability has been fixed in XWiki 14.10.19, 15.5.5, and 15.9. As a workaround, manually apply the patch by modifying the `Scheduler.WebHome` page.
Github GHSA Github GHSA GHSA-j2r6-r929-v6gf XWiki Platform CSRF in the job scheduler
History

Thu, 23 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Xwiki
Xwiki xwiki
CPEs cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
Vendors & Products Xwiki
Xwiki xwiki

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T01:59:50.770Z

Reserved: 2024-04-08T13:48:37.490Z

Link: CVE-2024-31985

cve-icon Vulnrichment

Updated: 2024-05-23T19:01:23.353Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-10T21:15:06.723

Modified: 2025-01-23T15:51:52.277

Link: CVE-2024-31985

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses