XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit rights on a page (e.g., it's own user page), can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the section ids in `XWiki.AdminFieldsDisplaySheet`. This page is installed by default. The vulnerability has been patched in XWiki versions 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11.
History

Thu, 06 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-02-06T16:07:30.169Z

Reserved: 2023-04-07T18:56:54.626Z

Link: CVE-2023-29511

cve-icon Vulnrichment

Updated: 2024-08-02T14:07:46.190Z

cve-icon NVD

Status : Modified

Published: 2023-04-16T08:15:07.630

Modified: 2024-11-21T07:57:12.303

Link: CVE-2023-29511

cve-icon Redhat

No data.