XWiki Platform is a generic wiki platform. Starting in version 5.0-rc-1 and prior to versions 14.10.20, 15.5.4, and 15.9-rc-1, any user with edit right on any page can execute any code on the server by adding an object of type `XWiki.SearchSuggestSourceClass` to their user profile or any other page. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10 RC1. As a workaround, manually apply the patch to the document `XWiki.SearchSuggestSourceSheet`.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-34fj-r5gq-7395 | XWiki Platform: Remote code execution from account via SearchSuggestSourceSheet |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 09 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xwiki
Xwiki xwiki |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* cpe:2.3:a:xwiki:xwiki:5.2:-:*:*:*:*:*:* cpe:2.3:a:xwiki:xwiki:5.2:milestone2:*:*:*:*:*:* cpe:2.3:a:xwiki:xwiki:5.2:rc1:*:*:*:*:*:* |
|
| Vendors & Products |
Xwiki
Xwiki xwiki |
Tue, 13 Aug 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:xwiki:xwiki-platform:15.6-rc-1:*:*:*:*:*:*:* cpe:2.3:a:xwiki:xwiki-platform:5.2-milestone-2:*:*:*:*:*:*:* |
|
| Vendors & Products |
Xwiki
Xwiki xwiki-platform |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-13T13:56:21.898Z
Reserved: 2024-04-03T17:55:32.648Z
Link: CVE-2024-31465
Updated: 2024-08-02T01:52:57.115Z
Status : Analyzed
Published: 2024-04-10T20:15:07.833
Modified: 2025-01-09T16:49:22.867
Link: CVE-2024-31465
No data.
OpenCVE Enrichment
No data.
Github GHSA