Vulnerability Description
XWiki Platform vulnerable to Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in AttachmentSelector.xml. The issue can also be reproduced by inserting the dangerous payload in the `height` or `alt` macro properties. This has been patched in versions 13.10.7, 14.4.2, and 14.5. The issue can be fixed on a running wiki by updating `XWiki.AttachmentSelector` with the versions below: - 14.5-rc-1+: https://github.com/xwiki/xwiki-platform/commit/eb15147adf94bddb92626f862c1710d45bcd64a7#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23 - 14.4.2+: https://github.com/xwiki/xwiki-platform/commit/c02f8eb1f3c953d124f2c097021536f8bc00fa8d#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23 - 13.10.7+: https://github.com/xwiki/xwiki-platform/commit/efd0df0468d46149ba68b66660b93f31b6318515#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xwiki | Xwiki | < 13.10.7 |
Related Weaknesses (CWE)
References
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9hqh-fmhg-vq2jExploitPatchThird Party Advisory
- https://jira.xwiki.org/browse/XWIKI-19800ExploitIssue TrackingVendor Advisory
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9hqh-fmhg-vq2jExploitPatchThird Party Advisory
- https://jira.xwiki.org/browse/XWIKI-19800ExploitIssue TrackingVendor Advisory
FAQ
What is CVE-2022-41928?
CVE-2022-41928 is a vulnerability with a CVSS score of 9.9 (CRITICAL). XWiki Platform vulnerable to Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in AttachmentSelector.xml. The issue can also be reproduced by inserting the dangero...
How severe is CVE-2022-41928?
CVE-2022-41928 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-41928?
Check the references section above for vendor advisories and patch information. Affected products include: Xwiki Xwiki.