Логотип exploitDog
bind:CVE-2025-53835
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-53835

Количество 3

Количество 3

nvd логотип

CVE-2025-53835

7 месяцев назад

XWiki Rendering is a generic rendering system that converts textual input in a given syntax (wiki syntax, HTML, etc) into another syntax (XHTML, etc). Starting in version 5.4.5 and prior to version 14.10, the XHTML syntax depended on the `xdom+xml/current` syntax which allows the creation of raw blocks that permit the insertion of arbitrary HTML content including JavaScript. This allows XSS attacks for users who can edit a document like their user profile (enabled by default). This has been fixed in version 14.10 by removing the dependency on the `xdom+xml/current` syntax from the XHTML syntax. Note that the `xdom+xml` syntax is still vulnerable to this attack. As it's main purpose is testing and its use is quite difficult, this syntax shouldn't be installed or used on a regular wiki. There are no known workarounds apart from upgrading.

CVSS3: 9
EPSS: Низкий
github логотип

GHSA-w3wh-g4m9-783p

7 месяцев назад

XWiki Rendering is vulnerable to XSS attacks through insecure XHTML syntax

CVSS3: 9
EPSS: Низкий
fstec логотип

BDU:2025-13119

почти 4 года назад

Уязвимость системы рендеринга XWiki Rendering, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю проводить межсайтовые сценарные атаки

CVSS3: 9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-53835

XWiki Rendering is a generic rendering system that converts textual input in a given syntax (wiki syntax, HTML, etc) into another syntax (XHTML, etc). Starting in version 5.4.5 and prior to version 14.10, the XHTML syntax depended on the `xdom+xml/current` syntax which allows the creation of raw blocks that permit the insertion of arbitrary HTML content including JavaScript. This allows XSS attacks for users who can edit a document like their user profile (enabled by default). This has been fixed in version 14.10 by removing the dependency on the `xdom+xml/current` syntax from the XHTML syntax. Note that the `xdom+xml` syntax is still vulnerable to this attack. As it's main purpose is testing and its use is quite difficult, this syntax shouldn't be installed or used on a regular wiki. There are no known workarounds apart from upgrading.

CVSS3: 9
2%
Низкий
7 месяцев назад
github логотип
GHSA-w3wh-g4m9-783p

XWiki Rendering is vulnerable to XSS attacks through insecure XHTML syntax

CVSS3: 9
2%
Низкий
7 месяцев назад
fstec логотип
BDU:2025-13119

Уязвимость системы рендеринга XWiki Rendering, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю проводить межсайтовые сценарные атаки

CVSS3: 9
2%
Низкий
почти 4 года назад

Уязвимостей на страницу