XWiki Platform is a generic wiki platform. Starting in version 3.1 and prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, by creating a document with a special crafted documented reference and an `XWiki.SchedulerJobClass` XObject, it is possible to execute arbitrary code on the server whenever an admin visits the scheduler page or the scheduler page is referenced, e.g., via an image in a comment on a page in the wiki. The vulnerability has been fixed in XWiki 14.10.19, 15.5.5, and 15.9. As a workaround, apply the patch manually by modifying the `Scheduler.WebHome` page.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-37m4-hqxv-w26g XWiki Platform CSRF remote code execution through scheduler job's document reference
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 21 Jan 2025 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T01:59:50.842Z

Reserved: 2024-04-08T13:48:37.490Z

Link: CVE-2024-31986

cve-icon Vulnrichment

Updated: 2024-07-19T15:18:59.326Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-10T21:15:06.917

Modified: 2025-01-21T15:43:52.013

Link: CVE-2024-31986

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.