CVE-2023-27480

HIGH

Xwiki < 13.10.11 - XXE

Title source: rule
STIX 2.1

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit rights on a document can trigger an XAR import on a forged XAR file, leading to the ability to display the content of any file on the XWiki server host. This vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10-rc-1. Users are advised to upgrade. Users unable to upgrade may apply the patch `e3527b98fd` manually.

References (3)

Core 3
Core References
Exploit, Patch, Vendor Advisory x_refsource_confirm
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx4f-976g-7g6v
Exploit, Issue Tracking, Patch, Vendor Advisory x_refsource_misc
https://jira.xwiki.org/browse/XWIKI-20320

Scores

CVSS v3 7.7
EPSS 0.0043
EPSS Percentile 62.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-611
Status published
Products (3)
org.xwiki.platform/xwiki-platform-xar-model 1.1-milestone-3 - 13.10.11Maven
xwiki/xwiki 1.1 milestone3 (2 CPE variants)
xwiki/xwiki 1.1 - 13.10.11
Published Mar 07, 2023
Tracked Since Feb 18, 2026