XWiki Platform Vulnerability Affects Remote Code Execution
CVE-2024-31996
Summary
The XWiki Platform contains a vulnerability in its HTML escaping tool, which fails to appropriately escape the {
character. This oversight potentially allows for XWiki syntax injection, resulting in remote code execution by an attacker. The issue exists in XWiki versions 3.0.1 and prior to 4.10.19, 15.5.4, and 15.10-rc-1. To remediate the vulnerability, users are advised to upgrade to the patched versions. Alternatively, a temporary fix involves replacing $escapetool.html
with $escapetool.xml
within specific XWiki documents. Notably, the panel document Panels.PanelLayoutUpdate
has been identified as one that exposes this vulnerability, but other extensions may also be susceptible and could require attention.
Affected Version(s)
xwiki-commons >= 3.0.1, < 14.10.19 < 3.0.1, 14.10.19
xwiki-commons >= 15.0-rc-1, < 15.5.4 < 15.0-rc-1, 15.5.4
xwiki-commons >= 15.6-rc-1, < 15.9-rc-1 < 15.6-rc-1, 15.9-rc-1
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved