Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to break many translations coming from wiki pages by creating a corrupted document containing a translation object. This will lead to a broken page. The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no workarounds other than fixing any way to create a document that fail to load.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xwiki | Xwiki | < 13.10.11 |
Related Weaknesses (CWE)
References
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9jq5-xwqw-q8j3ExploitVendor Advisory
- https://jira.xwiki.org/browse/XWIKI-20460ExploitIssue TrackingPatch
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9jq5-xwqw-q8j3ExploitVendor Advisory
- https://jira.xwiki.org/browse/XWIKI-20460ExploitIssue TrackingPatch
FAQ
What is CVE-2023-29520?
CVE-2023-29520 is a vulnerability with a CVSS score of 4.3 (MEDIUM). XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to break many translations coming from wiki pages by creating a corrupted documen...
How severe is CVE-2023-29520?
CVE-2023-29520 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-29520?
Check the references section above for vendor advisories and patch information. Affected products include: Xwiki Xwiki.