CVE-2023-29519

CRITICAL

Xwiki < 13.10.11 - Injection

Title source: rule
STIX 2.1

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the "property" field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References (3)

Core 3
Core References
Exploit, Patch, Vendor Advisory x_refsource_confirm
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3hjg-cghv-22ww
Exploit, Issue Tracking, Patch, Vendor Advisory x_refsource_misc
https://jira.xwiki.org/browse/XWIKI-20364

Scores

CVSS v3 9.0
EPSS 0.0474
EPSS Percentile 89.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-74
Status published
Products (2)
org.xwiki.platform/xwiki-platform-attachment-ui 3.0-rc-1 - 13.10.11Maven
xwiki/xwiki < 13.10.11
Published Apr 19, 2023
Tracked Since Feb 18, 2026