Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to make XWiki create many new schemas and fill them with tables just by using a crafted user identifier in the login form. This may lead to degraded database performance. The problem has been patched in XWiki 13.10.8, 14.6RC1 and 14.4.2. Users are advised to upgrade. There are no known workarounds for this issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xwiki | Xwiki | < 13.10.8 |
Related Weaknesses (CWE)
References
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4x5r-6v26-7j4vThird Party Advisory
- https://jira.xwiki.org/browse/XWIKI-19886Issue TrackingPatchVendor Advisory
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4x5r-6v26-7j4vThird Party Advisory
- https://jira.xwiki.org/browse/XWIKI-19886Issue TrackingPatchVendor Advisory
FAQ
What is CVE-2022-41932?
CVE-2022-41932 is a vulnerability with a CVSS score of 7.5 (HIGH). XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to make XWiki create many new schemas and fill them with tables just by using a c...
How severe is CVE-2022-41932?
CVE-2022-41932 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-41932?
Check the references section above for vendor advisories and patch information. Affected products include: Xwiki Xwiki.