Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions prior to 12.6.7 and 12.10.3, a user without Script or Programming right is able to execute script requiring privileges by editing gadget titles in the dashboard. The issue has been patched in XWiki 12.6.7, 12.10.3 and 13.0RC1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xwiki | Xwiki | >= 3.0.1, < 12.6.7 |
Related Weaknesses (CWE)
References
- https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7acPatchThird Party Advisory
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h353-hc43-95vcThird Party Advisory
- https://jay-from-future.github.io/cve/2021/06/17/xwiki-rce-cve.htmlExploitThird Party Advisory
- https://jira.xwiki.org/browse/XWIKI-17794Permissions RequiredVendor Advisory
- https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7acPatchThird Party Advisory
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h353-hc43-95vcThird Party Advisory
- https://jay-from-future.github.io/cve/2021/06/17/xwiki-rce-cve.htmlExploitThird Party Advisory
- https://jira.xwiki.org/browse/XWIKI-17794Permissions RequiredVendor Advisory
FAQ
What is CVE-2021-32621?
CVE-2021-32621 is a vulnerability with a CVSS score of 8.8 (HIGH). XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions prior to 12.6.7 and 12.10.3, a user without Script or Programming right is able to ...
How severe is CVE-2021-32621?
CVE-2021-32621 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-32621?
Check the references section above for vendor advisories and patch information. Affected products include: Xwiki Xwiki.