XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can view `Invitation.WebHome` can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. This vulnerability has been patched on XWiki 14.4.8, 15.2-rc-1, and 14.10.6. Users are advised to upgrade. Users unable to upgrade may manually apply the patch on `Invitation.InvitationCommon` and `Invitation.InvitationConfig`, but there are otherwise no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 08 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Xwiki xwiki-platform
|
|
CPEs | cpe:2.3:a:xwiki:xwiki-platform:*:*:*:*:*:*:*:* | |
Vendors & Products |
Xwiki xwiki-platform
|
|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-08-17T17:21:23.571Z
Updated: 2024-10-08T16:22:04.023Z
Reserved: 2023-07-10T17:51:29.611Z
Link: CVE-2023-37914
Vulnrichment
Updated: 2024-08-02T17:23:27.860Z
NVD
Status : Modified
Published: 2023-08-17T18:15:14.810
Modified: 2024-11-21T08:12:27.607
Link: CVE-2023-37914
Redhat
No data.