XWiki is a generic wiki platform offering runtime services for applications built on top of it. When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file. This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser. Users are advised to update or to disallow uploads of SVG files.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2022-0941 | XWiki is a generic wiki platform offering runtime services for applications built on top of it. When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file. This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser. Users are advised to update or to disallow uploads of SVG files. | 
  Github GHSA | 
                GHSA-9jq9-c2cv-pcrj | Cross-site Scripting by SVG upload in xwiki-platform | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    Tue, 22 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-22T18:27:22.922Z
Reserved: 2021-11-16T00:00:00.000Z
Link: CVE-2021-43841
Updated: 2024-08-04T04:10:16.304Z
Status : Modified
Published: 2022-02-04T23:15:11.957
Modified: 2024-11-21T06:29:54.490
Link: CVE-2021-43841
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD
 Github GHSA