Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j7p2-87q3-44w7

Опубликовано: 13 июн. 2025
Источник: github
Github: Прошло ревью
CVSS4: 6.4

Описание

XWiki does not require right warnings for notification displayer objects

Impact

When a user without script right creates a document with an XWiki.Notifications.Code.NotificationDisplayerClass object, and later an admin edits and saves that document, the possibly malicious content of that object is output as raw HTML, allowing XSS attacks. While the notification displayer executes Velocity, the existing generic analyzer already warns admins before editing Velocity code. Note that warnings before editing documents with dangerous properties have only been introduced in XWiki 15.9, before that version, this was a known issue and the advice was simply to be careful.

Patches

This vulnerability has been patched in XWiki 15.10.16, 16.4.7, and 16.10.2 by adding a required rights analyzer that warns the admin before editing about the possibly malicious code.

Workarounds

We're not aware of any real workarounds apart from just being careful with editing documents previously edited by untrusted users as a user with script, admin or programming right.

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-notifications-notifiers-default

maven
Затронутые версииВерсия исправления

>= 15.9-rc-1, < 15.10.16

15.10.16

Наименование

org.xwiki.platform:xwiki-platform-notifications-notifiers-default

maven
Затронутые версииВерсия исправления

>= 16.0.0-rc-1, < 16.4.7

16.4.7

Наименование

org.xwiki.platform:xwiki-platform-notifications-notifiers-default

maven
Затронутые версииВерсия исправления

>= 16.5.0-rc-1, < 16.10.2

16.10.2

EPSS

Процентиль: 47%
0.00245
Низкий

6.4 Medium

CVSS4

Дефекты

CWE-357

Связанные уязвимости

CVSS3: 8
nvd
8 месяцев назад

XWiki is an open-source wiki software platform. When a user without script right creates a document with an XWiki.Notifications.Code.NotificationDisplayerClass object, and later an admin edits and saves that document, the possibly malicious content of that object is output as raw HTML, allowing XSS attacks. While the notification displayer executes Velocity, the existing generic analyzer already warns admins before editing Velocity code. Note that warnings before editing documents with dangerous properties have only been introduced in XWiki 15.9, before that version, this was a known issue and the advice was simply to be careful. This vulnerability has been patched in XWiki 15.10.16, 16.4.7, and 16.10.2 by adding a required rights analyzer that warns the admin before editing about the possibly malicious code.

CVSS3: 6.5
fstec
больше 1 года назад

Уязвимость класса NotificationDisplayerClass платформы создания совместных веб-приложений XWiki Platform XWiki, позволяющая нарушителю проводить XSS-атаки

EPSS

Процентиль: 47%
0.00245
Низкий

6.4 Medium

CVSS4

Дефекты

CWE-357