Impact
An improperly protected scripting API in XWiki Platform allows any user who has the script right to bypass the sandboxing of the Velocity scripting engine and execute arbitrary Python scripts, thereby gaining full control of the instance. This vulnerability compromises confidentiality, integrity, and availability of the entire XWiki installation.
Affected Systems
The flaw affects the XWiki Platform product family before version 17.4.8 and 17.10.1, including the old core and legacy core components provided by the XWiki consortium. Users of these releases who have been granted script rights are at risk.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.6 and an EPSS score of less than 1 percent, and it is not listed in CISA’s KEV catalog. Exploitation requires a user with script rights, a privilege that should be reserved for trusted administrators. Once achieved, the attacker can execute arbitrary code and compromise the entire platform.
OpenCVE Enrichment
Github GHSA