Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jp4x-w9cj-97q7

Опубликовано: 13 июн. 2025
Источник: github
Github: Прошло ревью
CVSS4: 8.7

Описание

XWiki allows remote code execution through preview of XClass changes in AWM editor

Impact

Any XWiki user with edit right on at least one App Within Minutes application (the default for all users XWiki) can obtain programming right/perform remote code execution by editing the application. The detailed reproduction steps can be found in the original bug report.

Patches

This vulnerability has been fixed in XWiki 17.0.0, 16.4.7, and 16.10.3.

Workarounds

Restricting edit rights on all existing App Within Minutes applications to trusted users mitigates at least the PoC exploit, but we can't exclude that there are other ways to exploit this vulnerability.

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-oldcore

maven
Затронутые версииВерсия исправления

>= 7.2-milestone-2, < 16.4.7

16.4.7

Наименование

org.xwiki.platform:xwiki-platform-oldcore

maven
Затронутые версииВерсия исправления

>= 16.5.0-rc-1, < 16.10.3

16.10.3

Наименование

org.xwiki.platform:xwiki-platform-oldcore

maven
Затронутые версииВерсия исправления

>= 17.0.0-rc-1, < 17.0.0

17.0.0

EPSS

Процентиль: 90%
0.05436
Низкий

8.7 High

CVSS4

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 8.8
nvd
8 месяцев назад

XWiki is an open-source wiki software platform. Any XWiki user with edit right on at least one App Within Minutes application (the default for all users XWiki) can obtain programming right/perform remote code execution by editing the application. This vulnerability has been fixed in XWiki 17.0.0, 16.4.7, and 16.10.3.

CVSS3: 8.8
fstec
около 1 года назад

Уязвимость расширения App Within Minutes Application (AWM) платформы создания совместных веб-приложений XWiki Platform, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 90%
0.05436
Низкий

8.7 High

CVSS4

Дефекты

CWE-863