Description
XWiki Platform is a generic wiki platform. Starting in version 3.1 and prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, by creating a document with a special crafted documented reference and an `XWiki.SchedulerJobClass` XObject, it is possible to execute arbitrary code on the server whenever an admin visits the scheduler page or the scheduler page is referenced, e.g., via an image in a comment on a page in the wiki. The vulnerability has been fixed in XWiki 14.10.19, 15.5.5, and 15.9. As a workaround, apply the patch manually by modifying the `Scheduler.WebHome` page.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-37m4-hqxv-w26g | XWiki Platform CSRF remote code execution through scheduler job's document reference |
References
History
Tue, 21 Jan 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T01:59:50.842Z
Reserved: 2024-04-08T13:48:37.490Z
Link: CVE-2024-31986
Updated: 2024-07-19T15:18:59.326Z
Status : Analyzed
Published: 2024-04-10T21:15:06.917
Modified: 2025-01-21T15:43:52.013
Link: CVE-2024-31986
No data.
OpenCVE Enrichment
No data.
Github GHSA