XWiki Platform is a generic wiki platform. Starting in versions 2.2-milestone-1 and prior to versions 14.4.8, 14.10.4, and 15.0-rc-1, it's possible to execute javascript with the right of any user by leading him to a special URL on the wiki targeting a page which contains an attachment. This has been patched in XWiki 15.0-rc-1, 14.10.4, and 14.4.8. The easiest possible workaround is to edit file `<xwiki app>/templates/importinline.vm` and apply the modification described in commit 28905f7f518cc6f21ea61fe37e9e1ed97ef36f01.
Metrics
Affected Vendors & Products
References
History
Tue, 28 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-28T16:36:40.254Z
Reserved: 2023-05-01T16:47:35.314Z
Link: CVE-2023-32071

Updated: 2024-08-02T15:03:28.748Z

Status : Modified
Published: 2023-05-09T16:15:15.297
Modified: 2024-11-21T08:02:39.280
Link: CVE-2023-32071

No data.