CVE-2024-55663

CRITICAL

XWiki Platform <13.10.5-14.3-rc-1 - SQL Injection

Title source: llm
STIX 2.1

Description

XWiki Platform is a generic wiki platform. Starting in version 6.3-milestone-2 and prior to versions 13.10.5 and 14.3-rc-1, in `getdocument.vm`; the ordering of the returned documents is defined from an unsanitized request parameter (request.sort) and can allow any user to inject HQL. Depending on the used database backend, the attacker may be able to not only obtain confidential information such as password hashes from the database, but also execute UPDATE/INSERT/DELETE queries. This has been patched in 13.10.5 and 14.3-rc-1. There is no known workaround, other than upgrading XWiki.

Scores

CVSS v3 9.8
EPSS 0.0141
EPSS Percentile 80.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-116
Status published
Products (3)
org.xwiki.platform/xwiki-platform-distribution-war 6.3-milestone-2 - 13.10.5Maven
xwiki/xwiki 6.3 (3 CPE variants)
xwiki/xwiki 6.4 - 13.10.5
Published Dec 12, 2024
Tracked Since Feb 18, 2026