CVE-2024-31997
CRITICALXWiki Platform <4.10.19, 15.5.4, 15.10-rc-1 - RCE
Title source: llmDescription
XWiki Platform is a generic wiki platform. Prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, parameters of UI extensions are always interpreted as Velocity code and executed with programming rights. Any user with edit right on any document like the user's own profile can create UI extensions. This allows remote code execution and thereby impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.19, 15.5.4 and 15.9-RC1. No known workarounds are available.
References (5)
Core 5
Core References
Exploit, Vendor Advisory x_refsource_confirm
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c2gg-4gq4-jv5j
Patch x_refsource_misc
https://github.com/xwiki/xwiki-platform/commit/171e7c7d0e56deaa7b3678657ae26ef95379b1ea
Patch x_refsource_misc
https://github.com/xwiki/xwiki-platform/commit/1b2574eb966457ca4ef34e557376b8751d1be90d
Patch x_refsource_misc
https://github.com/xwiki/xwiki-platform/commit/56748e154a9011f0d6239bec0823eaaeab6ec3f7
Exploit, Vendor Advisory x_refsource_misc
https://jira.xwiki.org/browse/XWIKI-21335
Scores
CVSS v3
9.9
EPSS
0.5368
EPSS Percentile
98.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-862
Status
published
Products (2)
org.xwiki.platform/xwiki-platform-uiextension-api
0 - 14.10.19Maven
xwiki/xwiki
< 14.10.19
Published
Apr 10, 2024
Tracked Since
Feb 18, 2026