XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the "property" field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Subscriptions

Vendors Products

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3hjg-cghv-22ww org.xwiki.platform:xwiki-platform-attachment-ui vulnerable to Code Injection
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 05 Feb 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-02-05T18:46:04.993Z

Reserved: 2023-04-07T18:56:54.628Z

Link: CVE-2023-29519

cve-icon Vulnrichment

Updated: 2024-08-02T14:07:46.447Z

cve-icon NVD

Status : Modified

Published: 2023-04-19T00:15:08.647

Modified: 2024-11-21T07:57:13.240

Link: CVE-2023-29519

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses