Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The create action is vulnerable to a CSRF attack, allowing script and thus remote code execution when targeting a user with script/programming right, thus compromising the confidentiality, integrity and availability of the whole XWiki installation. When a user with script right views this image and a log message `ERROR foo - Script executed!` appears in the log, the XWiki installation is vulnerable. This has been patched in XWiki 14.10.9 and 15.4RC1 by requiring a CSRF token for the actual page creation.
References (3)
Core 3
Core References
Patch, Vendor Advisory x_refsource_confirm
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8m-7h83-9f6m
Patch x_refsource_misc
https://github.com/xwiki/xwiki-platform/commit/4b20528808d0c311290b0d9ab2cfc44063380ef7
Exploit, Issue Tracking, Vendor Advisory x_refsource_misc
https://jira.xwiki.org/browse/XWIKI-20849
Scores
CVSS v3
9.0
EPSS
0.0180
EPSS Percentile
82.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-352
Status
published
Products (6)
org.xwiki.platform/xwiki-platform-oldcore
3.2-milestone-3 - 14.10.9Maven
xwiki/xwiki
15.0 (2 CPE variants)
xwiki/xwiki
15.1 (2 CPE variants)
xwiki/xwiki
15.2 (2 CPE variants)
xwiki/xwiki
15.3 (2 CPE variants)
xwiki/xwiki
< 14.10.9
Published
Aug 24, 2023
Tracked Since
Feb 18, 2026