Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c32m-27pj-4xcj

Опубликовано: 13 июн. 2025
Источник: github
Github: Прошло ревью
CVSS4: 8.6

Описание

XWiki's required right warnings for macros are incomplete

Impact

When editing content that contains "dangerous" macros like malicious script macros that were authored by a user with fewer rights, XWiki warns about the execution of these macros since XWiki 15.9RC1. These required rights analyzers that trigger these warnings are incomplete, allowing an attacker to hide malicious content. For most macros, the existing analyzers don't consider non-lowercase parameters. Further, most macro parameters that can contain XWiki syntax like titles of information boxes weren't analyzed at all. Similarly, the "source" parameters of the content and context macro weren't anylzed even though they could contain arbitrary XWiki syntax. In the worst case, this could allow a malicious to add malicious script macros including Groovy or Python macros to a page that are then executed after another user with programming righs edits the page, thus allowing remote code execution.

Patches

The required rights analyzers have been made more robust and extended to cover those cases in XWiki 16.4.7, 16.10.3 and 17.0.0.

Workarounds

We're not aware of any workarounds except for being careful when editing content authored by untrusted users.

References

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-rendering-xwiki

maven
Затронутые версииВерсия исправления

>= 15.9-rc-1, < 16.4.7

16.4.7

Наименование

org.xwiki.platform:xwiki-platform-rendering-xwiki

maven
Затронутые версииВерсия исправления

>= 16.5.0-rc-1, < 16.10.3

16.10.3

Наименование

org.xwiki.platform:xwiki-platform-rendering-xwiki

maven
Затронутые версииВерсия исправления

>= 17.0.0-rc-1, < 17.0.0

17.0.0

Наименование

org.xwiki.platform:xwiki-platform-rendering-macro-cache

maven
Затронутые версииВерсия исправления

>= 15.9-rc-1, < 16.4.7

16.4.7

Наименование

org.xwiki.platform:xwiki-platform-rendering-macro-cache

maven
Затронутые версииВерсия исправления

>= 16.5.0-rc-1, < 16.10.3

16.10.3

Наименование

org.xwiki.platform:xwiki-platform-rendering-macro-cache

maven
Затронутые версииВерсия исправления

>= 17.0.0-rc-1, < 17.0.0

17.0.0

Наименование

org.xwiki.platform:xwiki-platform-security-requiredrights-default

maven
Затронутые версииВерсия исправления

>= 15.9-rc-1, < 16.4.7

16.4.7

Наименование

org.xwiki.platform:xwiki-platform-security-requiredrights-default

maven
Затронутые версииВерсия исправления

>= 16.5.0-rc-1, < 16.10.3

16.10.3

Наименование

org.xwiki.platform:xwiki-platform-security-requiredrights-default

maven
Затронутые версииВерсия исправления

>= 17.0.0-rc-1, < 17.0.0

17.0.0

Наименование

org.xwiki.platform:xwiki-platform-rendering-macro-context

maven
Затронутые версииВерсия исправления

>= 15.9-rc-1, < 16.4.7

16.4.7

Наименование

org.xwiki.platform:xwiki-platform-rendering-macro-context

maven
Затронутые версииВерсия исправления

>= 16.5.0-rc-1, < 16.10.3

16.10.3

Наименование

org.xwiki.platform:xwiki-platform-rendering-macro-context

maven
Затронутые версииВерсия исправления

>= 17.0.0-rc-1, < 17.0.0

17.0.0

EPSS

Процентиль: 72%
0.00734
Низкий

8.6 High

CVSS4

Дефекты

CWE-357

Связанные уязвимости

CVSS3: 8
nvd
8 месяцев назад

XWiki is a generic wiki platform. When editing content that contains "dangerous" macros like malicious script macros that were authored by a user with fewer rights, XWiki warns about the execution of these macros since XWiki 15.9RC1. These required rights analyzers that trigger these warnings are incomplete, allowing an attacker to hide malicious content. For most macros, the existing analyzers don't consider non-lowercase parameters. Further, most macro parameters that can contain XWiki syntax like titles of information boxes weren't analyzed at all. Similarly, the "source" parameters of the content and context macro weren't anylzed even though they could contain arbitrary XWiki syntax. In the worst case, this could allow a malicious to add malicious script macros including Groovy or Python macros to a page that are then executed after another user with programming righs edits the page, thus allowing remote code execution. The required rights analyzers have been made more robust and e

CVSS3: 8
fstec
около 1 года назад

Уязвимость макросов CacheMacroRequiredRightsAnalyzer.java, ContentMacroRequiredRightsAnalyzer.java, DefaultMacroBlockRequiredRightAnalyzer.java и ContextMacroRequiredRightsAnalyzer.java платформы создания совместных веб-приложений XWiki Platform XWiki, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 72%
0.00734
Низкий

8.6 High

CVSS4

Дефекты

CWE-357