Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the "property" field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3hjg-cghv-22ww | org.xwiki.platform:xwiki-platform-attachment-ui vulnerable to Code Injection |
References
History
Wed, 05 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-05T18:46:04.993Z
Reserved: 2023-04-07T18:56:54.628Z
Link: CVE-2023-29519
Updated: 2024-08-02T14:07:46.447Z
Status : Modified
Published: 2023-04-19T00:15:08.647
Modified: 2024-11-21T07:57:13.240
Link: CVE-2023-29519
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA