CVE-2022-41931

CRITICAL

xwiki-platform-icon-ui - Eval Injection

Title source: llm
STIX 2.1

Description

xwiki-platform-icon-ui is vulnerable to Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection'). Any user with view rights on commonly accessible documents including the icon picker macro can execute arbitrary Groovy, Python or Velocity code in XWiki due to improper neutralization of the macro parameters of the icon picker macro. The problem has been patched in XWiki 13.10.7, 14.5 and 14.4.2. Workarounds: The [patch](https://github.com/xwiki/xwiki-platform/commit/47eb8a5fba550f477944eb6da8ca91b87eaf1d01) can be manually applied by editing `IconThemesCode.IconPickerMacro` in the object editor. The whole document can also be replaced by the current version by importing the document from the XAR archive of a fixed version as the only changes to the document have been security fixes and small formatting changes.

Scores

CVSS v3 9.9
EPSS 0.1893
EPSS Percentile 95.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-95
Status published
Products (5)
org.xwiki.platform/xwiki-platform-icon-ui 6.4-milestone-2 - 13.10.7Maven
xwiki/xwiki 6.4 milestone2 (2 CPE variants)
xwiki/xwiki 14.4.3
xwiki/xwiki 14.4.4
xwiki/xwiki 6.4 - 13.10.7
Published Nov 23, 2022
Tracked Since Feb 18, 2026