First published: Thu Apr 28 2022(Updated: )
org.xwiki.commons:xwiki-commons-xml is a common module used by other XWiki top level projects. Starting in version 2.7 and prior to versions 12.10.10, 13.4.4, and 13.8-rc-1, it is possible for a script to access any file accessing to the user running XWiki application server with XML External Entity Injection through the XML script service. The problem has been patched in versions 12.10.10, 13.4.4, and 13.8-rc-1. There is no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
XWiki Commons | >=2.7<12.10.10 | |
XWiki Commons | >=13.0<13.4.4 | |
XWiki Commons | >=13.5<13.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2022-24898.
The severity of CVE-2022-24898 is medium with a severity value of 4.9.
The affected software of CVE-2022-24898 is XWiki Commons versions 2.7 to 12.10.10, 13.0 to 13.4.4, and 13.5 to 13.8.
CVE-2022-24898 is a vulnerability in org.xwiki.commons:xwiki-commons-xml that allows a script to access any file, potentially exposing sensitive information.
To fix CVE-2022-24898, update XWiki Commons to version 12.10.10, 13.4.4, or 13.8-rc-1.