Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jm43-hrq7-r7w6

Опубликовано: 13 июн. 2025
Источник: github
Github: Прошло ревью
CVSS4: 8.5

Описание

XWiki allows privilege escalation through link refactoring

Impact

Pages can gain script or programming rights when they contain a link and the target of the link is renamed or moved. This might lead to execution of scripts contained in xobjects that should have never been executed. This vulnerability affects all version of XWiki since 8.2 and 7.4.5.

Patches

The patch consists in only setting the originalMetadataAuthor when performing such change, so that it's displayed in the history but it has no impact on the right evaluation (i.e. the original author of the changes is still used for right computation).

This patch has been applied on XWiki 16.4.7, 17.1.0RC1, 16.10.4.

Workarounds

There's no workaround for this vulnerability, except preventing to perform any refactoring operation with users having more than edit rights. Administrators are strongly advised to upgrade. If not possible, the patch only impacts module xwiki-platform-refactoring-default so it's possible to apply the commit and rebuild and deploy only that module.

CVSS explanation

Attack vector: Network - Always for XWiki. Complexity: Low - The set of operations to perform the attack is quite easy. Attack requirements: None - Any system is vulnerable, it doesn't depend on specific condition other than user interaction. Privileges required: Low - The attacker only needs edit rights. User interaction: Active - To be successful the attack needs someone with more rights to perform a move/rename of a specific page. Confidentiality: High - The attack might lead to execution of any script. Integrity: High - The attack might lead to execution of any script. Availability: High - The attack might lead to execution of any script. Subsequent system impacts: None for any criteria. Only current system is affected.

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-refactoring-default

maven
Затронутые версииВерсия исправления

>= 17.0.0-rc-1, < 17.1.0-rc-1

17.1.0-rc-1

Наименование

org.xwiki.platform:xwiki-platform-refactoring-default

maven
Затронутые версииВерсия исправления

>= 16.5.0-rc-1, < 16.10.4

16.10.4

Наименование

org.xwiki.platform:xwiki-platform-refactoring-default

maven
Затронутые версииВерсия исправления

>= 8.2, < 16.4.7

16.4.7

Наименование

org.xwiki.platform:xwiki-platform-refactoring-default

maven
Затронутые версииВерсия исправления

>= 7.4.5

Отсутствует

EPSS

Процентиль: 58%
0.00366
Низкий

8.5 High

CVSS4

Дефекты

CWE-266

Связанные уязвимости

CVSS3: 8
nvd
8 месяцев назад

XWiki is a generic wiki platform. From 8.2 and 7.4.5 until 17.1.0-rc-1, 16.10.4, and 16.4.7, pages can gain script or programming rights when they contain a link and the target of the link is renamed or moved. This might lead to execution of scripts contained in xobjects that should have never been executed. This vulnerability is fixed in 17.1.0-rc-1, 16.10.4, and 16.4.7.

CVSS3: 8
fstec
8 месяцев назад

Уязвимость платформы создания совместных веб-приложений XWiki Platform, связанная с некорректным присваиванием привилегий, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

EPSS

Процентиль: 58%
0.00366
Низкий

8.5 High

CVSS4

Дефекты

CWE-266