XWiki Platform Vulnerability Affects Remote Code Execution
CVE-2024-31996 
What is CVE-2024-31996?
The XWiki Platform contains a vulnerability in its HTML escaping tool, which fails to appropriately escape the { character. This oversight potentially allows for XWiki syntax injection, resulting in remote code execution by an attacker. The issue exists in XWiki versions 3.0.1 and prior to 4.10.19, 15.5.4, and 15.10-rc-1. To remediate the vulnerability, users are advised to upgrade to the patched versions. Alternatively, a temporary fix involves replacing $escapetool.html with $escapetool.xml within specific XWiki documents. Notably, the panel document Panels.PanelLayoutUpdate has been identified as one that exposes this vulnerability, but other extensions may also be susceptible and could require attention.
Affected Version(s)
xwiki-commons >= 3.0.1, < 14.10.19 < 3.0.1, 14.10.19
xwiki-commons >= 15.0-rc-1, < 15.5.4 < 15.0-rc-1, 15.5.4
xwiki-commons >= 15.6-rc-1, < 15.9-rc-1 < 15.6-rc-1, 15.9-rc-1
References
EPSS Score
18% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- Vulnerability published 
- Vulnerability Reserved