Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString as `$xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg")`. This issue has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1. Users are advised to update. The only workaround is to limit SCRIPT right.
References (3)
Core 3
Core References
Third Party Advisory x_refsource_confirm
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2jhm-qp48-hv5j
Patch, Third Party Advisory x_refsource_misc
https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a
Patch, Vendor Advisory x_refsource_misc
https://jira.xwiki.org/browse/XWIKI-18870
Scores
CVSS v3
5.5
EPSS
0.0010
EPSS Percentile
28.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-552
CWE-862
Status
published
Products (2)
org.xwiki.platform/xwiki-platform-oldcore
13.6-rc-1 - 13.7-rc-1Maven
xwiki/xwiki
< 12.10.9
Published
Feb 09, 2022
Tracked Since
Feb 18, 2026