Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to execute a content with the right of any user via a crafted URL. A user must have `programming` privileges in order to exploit this vulnerability. This issue has been patched in XWiki 14.10.7 and 15.2RC1. Users are advised to upgrade. There are no known workarounds for for this vulnerability.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xwiki | Xwiki | >= 1.0, < 14.10.7 |
Related Weaknesses (CWE)
References
- https://github.com/xwiki/xwiki-platform/commit/cf8eb861998ea423c3645d2e5e974420bPatch
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hgpw-6p4h-j6h5PatchVendor Advisory
- https://jira.xwiki.org/browse/XWIKI-20386Issue TrackingVendor Advisory
- https://github.com/xwiki/xwiki-platform/commit/cf8eb861998ea423c3645d2e5e974420bPatch
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hgpw-6p4h-j6h5PatchVendor Advisory
- https://jira.xwiki.org/browse/XWIKI-20386Issue TrackingVendor Advisory
FAQ
What is CVE-2023-46242?
CVE-2023-46242 is a vulnerability with a CVSS score of 9.6 (CRITICAL). XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to execute a content with the right of any user via a crafte...
How severe is CVE-2023-46242?
CVE-2023-46242 has been rated CRITICAL with a CVSS base score of 9.6/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-46242?
Check the references section above for vendor advisories and patch information. Affected products include: Xwiki Xwiki.