CVE-2024-31982

CRITICAL EXPLOITED NUCLEI

XWiki Platform <4.10.20,15.5.4,15.10-rc-1 - RCE

Title source: llm

Description

XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, XWiki's database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may manually apply the patch to the page `Main.DatabaseSearch`. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki.

Exploits (6)

nomisec WORKING POC 10 stars
by bigb0x · remote
https://github.com/bigb0x/CVE-2024-31982
nomisec WORKING POC 1 stars
by NanoWraith · poc
https://github.com/NanoWraith/CVE-2024-31982
gitlab WORKING POC
by LibreCoder951 · poc
https://gitlab.com/LibreCoder951/cve-2024-31982-reverse-shell
nomisec WORKING POC
by raishin1 · remote-auth
https://github.com/raishin1/CVE-2024-31982
nomisec WORKING POC
by th3gokul · remote
https://github.com/th3gokul/CVE-2024-31982
vulncheck_xdb WORKING POC
remote
https://github.com/k3lpi3b4nsh33/CVE-2024-31982

Nuclei Templates (1)

XWiki < 4.10.20 - Remote code execution
CRITICALVERIFIEDby ritikchaddha
Shodan: html:"data-xwiki-reference"
FOFA: body="data-xwiki-reference"

Scores

CVSS v3 10.0
EPSS 0.9425
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Details

VulnCheck KEV 2024-06-26
CWE
CWE-95 CWE-94
Status published
Products (2)
org.xwiki.platform/xwiki-platform-search-ui 2.4-milestone-1 - 14.10.20Maven
xwiki/xwiki 2.4 - 14.10.20
Published Apr 10, 2024
Tracked Since Feb 18, 2026