CVE-2023-32071

CRITICAL

XWiki Platform <2.2-14.4.8, <14.10.4, <15.0-rc-1 - XSS

Title source: llm
STIX 2.1

Description

XWiki Platform is a generic wiki platform. Starting in versions 2.2-milestone-1 and prior to versions 14.4.8, 14.10.4, and 15.0-rc-1, it's possible to execute javascript with the right of any user by leading him to a special URL on the wiki targeting a page which contains an attachment. This has been patched in XWiki 15.0-rc-1, 14.10.4, and 14.4.8. The easiest possible workaround is to edit file `<xwiki app>/templates/importinline.vm` and apply the modification described in commit 28905f7f518cc6f21ea61fe37e9e1ed97ef36f01.

Scores

CVSS v3 9.0
EPSS 0.4678
EPSS Percentile 97.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-79 CWE-116
Status published
Products (3)
org.xwiki.platform/xwiki-platform-distribution-war 2.2-milestone-1 - 14.4.8Maven
xwiki/xwiki 2.2 milestone1
xwiki/xwiki 2.3 - 14.4.8
Published May 09, 2023
Tracked Since Feb 18, 2026