XWiki Platform Vulnerability Affects Remote Code Execution
CVE-2024-31996

9.8CRITICAL

Key Information:

Vendor
Xwiki
Vendor
CVE Published:
10 April 2024

Summary

The XWiki Platform contains a vulnerability in its HTML escaping tool, which fails to appropriately escape the { character. This oversight potentially allows for XWiki syntax injection, resulting in remote code execution by an attacker. The issue exists in XWiki versions 3.0.1 and prior to 4.10.19, 15.5.4, and 15.10-rc-1. To remediate the vulnerability, users are advised to upgrade to the patched versions. Alternatively, a temporary fix involves replacing $escapetool.html with $escapetool.xml within specific XWiki documents. Notably, the panel document Panels.PanelLayoutUpdate has been identified as one that exposes this vulnerability, but other extensions may also be susceptible and could require attention.

Affected Version(s)

xwiki-commons >= 3.0.1, < 14.10.19 < 3.0.1, 14.10.19

xwiki-commons >= 15.0-rc-1, < 15.5.4 < 15.0-rc-1, 15.5.4

xwiki-commons >= 15.6-rc-1, < 15.9-rc-1 < 15.6-rc-1, 15.9-rc-1

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.