Description
XWiki Platform Web Parent POM contains Web resources for the XWiki platform, a generic wiki platform. Starting with version 1.0 and prior to versions 13.10.6 and 14.30-rc-1, it's possible to store JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3RC1. As a workaround, it is possible to replace `viewattachrev.vm`, the entry point for this attack, by a patched version from the patch without updating XWiki.
References (3)
Core 3
Core References
Third Party Advisory x_refsource_confirm
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mxf2-4r22-5hq9
Patch, Third Party Advisory x_refsource_misc
https://github.com/xwiki/xwiki-platform/commit/047ce9fa4a7c13f3883438aaf54fc50f287a7e8e
Exploit, Vendor Advisory x_refsource_misc
https://jira.xwiki.org/browse/XWIKI-19612
Scores
CVSS v3
8.9
EPSS
0.4921
EPSS Percentile
97.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-80
CWE-79
Status
published
Products (2)
org.xwiki.platform/xwiki-platform-web
1.0 - 13.10.6Maven
xwiki/xwiki
1.0 - 13.10.6
Published
Sep 08, 2022
Tracked Since
Feb 18, 2026