XWiki Platform is a generic wiki platform. Starting in version 3.1 and prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, by creating a document with a special crafted documented reference and an `XWiki.SchedulerJobClass` XObject, it is possible to execute arbitrary code on the server whenever an admin visits the scheduler page or the scheduler page is referenced, e.g., via an image in a comment on a page in the wiki. The vulnerability has been fixed in XWiki 14.10.19, 15.5.5, and 15.9. As a workaround, apply the patch manually by modifying the `Scheduler.WebHome` page.
Metrics
Affected Vendors & Products
References
History
Tue, 21 Jan 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T01:59:50.842Z
Reserved: 2024-04-08T13:48:37.490Z
Link: CVE-2024-31986

Updated: 2024-07-19T15:18:59.326Z

Status : Analyzed
Published: 2024-04-10T21:15:06.917
Modified: 2025-01-21T15:43:52.013
Link: CVE-2024-31986

No data.