Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to execute any wiki content with the right of the TipsPanel author by creating a tip UI extension. This has been patched in XWiki 15.1-rc-1 and 14.10.5.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xwiki | Xwiki | >= 8.1, < 14.10.5 |
Related Weaknesses (CWE)
References
- https://github.com/xwiki/xwiki-platform/commit/98208c5bb1e8cdf3ff1ac35d8b3d1cb3cPatch
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h7cw-44vp-jq7hPatchVendor Advisory
- https://jira.xwiki.org/browse/XWIKI-20281ExploitVendor Advisory
- https://github.com/xwiki/xwiki-platform/commit/98208c5bb1e8cdf3ff1ac35d8b3d1cb3cPatch
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h7cw-44vp-jq7hPatchVendor Advisory
- https://jira.xwiki.org/browse/XWIKI-20281ExploitVendor Advisory
FAQ
What is CVE-2023-35166?
CVE-2023-35166 is a vulnerability with a CVSS score of 9.9 (CRITICAL). XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to execute any wiki content with the right of the TipsPanel author by creating a ...
How severe is CVE-2023-35166?
CVE-2023-35166 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-35166?
Check the references section above for vendor advisories and patch information. Affected products include: Xwiki Xwiki.