CVE-2023-29512

CRITICAL

Xwiki < 13.10.11 - Injection

Title source: rule
STIX 2.1

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit rights on a page (e.g., it's own user page), can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the information loaded from attachments in `imported.vm`, `importinline.vm`, and `packagelist.vm`. This page is installed by default. This vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References (3)

Core 3
Core References
Exploit, Patch, Vendor Advisory x_refsource_confirm
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hg5x-3w3x-7g96
Exploit, Issue Tracking, Patch, Vendor Advisory x_refsource_misc
https://jira.xwiki.org/browse/XWIKI-20267

Scores

CVSS v3 9.9
EPSS 0.2936
EPSS Percentile 96.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-74
Status published
Products (2)
org.xwiki.platform/xwiki-platform-web-templates 1.0B1 - 13.10.11Maven
xwiki/xwiki < 13.10.11
Published Apr 19, 2023
Tracked Since Feb 18, 2026