CVE-2023-29518

CRITICAL

Xwiki < 13.10.11 - Injection

Title source: rule
STIX 2.1

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of `Invitation.InvitationCommon`. This page is installed by default. The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this issue.

References (3)

Core 3
Core References
Exploit, Patch, Vendor Advisory x_refsource_confirm
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-px54-3w5j-qjg9
Exploit, Issue Tracking, Patch, Vendor Advisory x_refsource_misc
https://jira.xwiki.org/browse/XWIKI-20283

Scores

CVSS v3 9.9
EPSS 0.2936
EPSS Percentile 96.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-74
Status published
Products (2)
org.xwiki.platform/xwiki-platform-invitation-ui 2.5-m-1 - 13.10.11Maven
xwiki/xwiki < 13.10.11
Published Apr 19, 2023
Tracked Since Feb 18, 2026