First published: Tue May 18 2021(Updated: )
### Impact A user disabled on a wiki using email verification for registration can re-activate himself by using the activation link provided for his registration. ### Patches The problem has been patched in the following versions of XWiki: 11.10.13, 12.6.7, 12.10.2, 13.0. ### Workarounds It's possible to workaround the issue by resetting the `validkey` property of the disabled XWiki users. This can be done by editing the user profile with object editor. ### References https://jira.xwiki.org/browse/XWIKI-17942 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](http://jira.xwiki.org) * Email us at [Security mailing-list](mailto:security@xwiki.org)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.xwiki.commons:xwiki-commons-core | >=11.6<11.10.13 | 11.10.13 |
maven/org.xwiki.commons:xwiki-commons-core | >=12.10.0<12.10.2 | 12.10.2 |
maven/org.xwiki.commons:xwiki-commons-core | >=12.0<12.6.7 | 12.6.7 |
Xwiki | >=11.6<11.10.13 | |
Xwiki | >=12.0<12.6.7 | |
Xwiki | >=12.7<12.10.2 | |
Xwiki | >=12.10.3<13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32620 is classified as a moderate vulnerability due to the potential for unauthorized reactivation of disabled user accounts.
To fix CVE-2021-32620, upgrade to XWiki versions 11.10.13, 12.6.7, 12.10.2, or 13.0.
CVE-2021-32620 affects XWiki versions from 11.6 to 11.10.12, 12.0 to 12.6.6, and 12.7 to 12.10.1.
CVE-2021-32620 allows users who have been disabled on a wiki to reactivate themselves using an activation link.
You can determine if your XWiki installation is vulnerable by checking if it is running any versions prior to the patched versions.