XWiki Platform Attachment UI provides a macro to easily upload and select attachments for XWiki Platform, a generic wiki platform. Starting with version 14.0-rc-1 and prior to 14.4-rc-1, it's possible to store JavaScript in an attachment name, which will be executed by anyone trying to move the corresponding attachment. This issue has been patched in XWiki 14.4-rc-1. As a workaround, one may copy `moveStep1.vm` to `webapp/xwiki/templates/moveStep1.vm` and replace vulnerable code with code from the patch.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9r9j-57rf-f6vj | XWiki Platform Attachment UI vulnerable to cross-site scripting in the move attachment form |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 22 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-22T17:22:54.187Z
Reserved: 2022-07-15T00:00:00.000Z
Link: CVE-2022-36097
Updated: 2024-08-03T09:52:00.510Z
Status : Modified
Published: 2022-09-08T21:15:08.020
Modified: 2024-11-21T07:12:22.857
Link: CVE-2022-36097
No data.
OpenCVE Enrichment
No data.
Github GHSA