First published: Wed Feb 09 2022(Updated: )
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. This has been patched in XWiki 13.0. Users are advised to update to resolve this issue. The only known workaround is to limit SCRIPT access.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | >=1.0<13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-23615 is considered high due to the potential for unauthorized access to sensitive API functions.
CVE-2022-23615 affects XWiki versions from 1.0 up to, but not including, version 13.0.
To fix CVE-2022-23615, upgrade your XWiki installation to version 13.0 or later.
CVE-2022-23615 allows users with SCRIPT rights to perform actions under the privileges of the current user, which may lead to unauthorized access.
Users with SCRIPT rights in affected XWiki installations are most at risk from CVE-2022-23615.