Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with the right to add an object on a page can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the styles properties `FlamingoThemesCode.WebHome`. This page is installed by default. The vulnerability has been patched in XWiki versions 13.10.11, 14.4.7 and 14.10.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xwiki | Xwiki | >= 12.6.6, < 13.10.11 |
Related Weaknesses (CWE)
References
- https://github.com/xwiki/xwiki-platform/commit/df596f15368342236f8899ca122af8f3dPatch
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vrr8-fp7c-7qgpExploitPatchVendor Advisory
- https://jira.xwiki.org/browse/XWIKI-20280ExploitIssue TrackingPatch
- https://github.com/xwiki/xwiki-platform/commit/df596f15368342236f8899ca122af8f3dPatch
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vrr8-fp7c-7qgpExploitPatchVendor Advisory
- https://jira.xwiki.org/browse/XWIKI-20280ExploitIssue TrackingPatch
FAQ
What is CVE-2023-30537?
CVE-2023-30537 is a vulnerability with a CVSS score of 9.9 (CRITICAL). XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with the right to add an object on a page can execute arbitrary Groovy, Python or Velo...
How severe is CVE-2023-30537?
CVE-2023-30537 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-30537?
Check the references section above for vendor advisories and patch information. Affected products include: Xwiki Xwiki.