Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki is vulnerable to reflected cross-site scripting (RXSS) via the `rev` parameter that is used in the content of the content menu without escaping. If an attacker can convince a user to visit a link with a crafted parameter, this allows the attacker to execute arbitrary actions in the name of the user, including remote code (Groovy) execution in the case of a user with programming right, compromising the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.6 RC1, 15.5.1 and 14.10.14. The patch in commit `04e325d57` can be manually applied without upgrading (or restarting) the instance. Users are advised to upgrade or to manually apply the patch. There are no known workarounds for this vulnerability.
Published: 2023-11-06
Score: 9.7 Critical
EPSS: 48.1% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-j9rc-w3wv-fv62 XWiki Platform vulnerable to reflected cross-site scripting through revision parameter in content menu
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-09-05T13:31:18.349Z

Reserved: 2023-10-25T14:30:33.752Z

Link: CVE-2023-46732

cve-icon Vulnrichment

Updated: 2024-08-02T20:53:20.797Z

cve-icon NVD

Status : Modified

Published: 2023-11-06T19:15:09.397

Modified: 2024-11-21T08:29:11.057

Link: CVE-2023-46732

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses