Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Prior to 17.4.8 and 17.10.1, an improperly protected scripting API allows any user with script right to bypass the sandboxing of the Velocity scripting API and execute, e.g., arbitrary Python scripts, allowing full access to the XWiki instance and thereby compromising the confidentiality, integrity and availability of the whole instance. Note that script right already constitutes a high level of access that we don't recommend giving to untrusted users. This vulnerability is fixed in 17.4.8 and 17.10.1.
Published: 2026-04-08
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

An improperly protected scripting API in XWiki Platform allows any user who has the script right to bypass the sandboxing of the Velocity scripting engine and execute arbitrary Python scripts, thereby gaining full control of the instance. This vulnerability compromises confidentiality, integrity, and availability of the entire XWiki installation.

Affected Systems

The flaw affects the XWiki Platform product family before version 17.4.8 and 17.10.1, including the old core and legacy core components provided by the XWiki consortium. Users of these releases who have been granted script rights are at risk.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.6 and an EPSS score of less than 1 percent, and it is not listed in CISA’s KEV catalog. Exploitation requires a user with script rights, a privilege that should be reserved for trusted administrators. Once achieved, the attacker can execute arbitrary code and compromise the entire platform.

Generated by OpenCVE AI on April 14, 2026 at 21:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update XWiki Platform to at least version 17.4.8 or 17.10.1 to eliminate the vulnerability.
  • Revoke script rights from untrusted or non‑administrative users to prevent use of the exposed API.
  • Verify that the Velocity scripting sandbox is active and no custom extensions expose the API backdoor.

Generated by OpenCVE AI on April 14, 2026 at 21:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-h259-74h5-4rh9 XWiki vulnerable to remote code execution with script right through unprotected Velocity scripting API
History

Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Xwiki xwiki
CPEs cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
Vendors & Products Xwiki xwiki

Fri, 10 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Xwiki
Xwiki wiki-platform
Xwiki wiki-platform-legacy-oldcore
Xwiki wiki-platform-oldcore
Vendors & Products Xwiki
Xwiki wiki-platform
Xwiki wiki-platform-legacy-oldcore
Xwiki wiki-platform-oldcore

Wed, 08 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Prior to 17.4.8 and 17.10.1, an improperly protected scripting API allows any user with script right to bypass the sandboxing of the Velocity scripting API and execute, e.g., arbitrary Python scripts, allowing full access to the XWiki instance and thereby compromising the confidentiality, integrity and availability of the whole instance. Note that script right already constitutes a high level of access that we don't recommend giving to untrusted users. This vulnerability is fixed in 17.4.8 and 17.10.1.
Title XWiki Platform affected by remote code execution with script right through unprotected Velocity scripting API
Weaknesses CWE-862
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Xwiki Wiki-platform Wiki-platform-legacy-oldcore Wiki-platform-oldcore Xwiki
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-10T20:33:15.897Z

Reserved: 2026-03-18T02:42:27.507Z

Link: CVE-2026-33229

cve-icon Vulnrichment

Updated: 2026-04-10T20:33:10.351Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T16:16:23.430

Modified: 2026-04-14T20:08:07.927

Link: CVE-2026-33229

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:15:11Z

Weaknesses