First published: Tue May 31 2022(Updated: )
XWiki Platform Filter UI provides a generic user interface to convert from a XWiki Filter input stream to an output stream with settings for each stream. Starting with versions 6.0-milestone-2 and 5.4.4 and prior to versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3, XWiki Platform Filter UI contains a possible cross-site scripting vector in the `Filter.FilterStreamDescriptorForm` wiki page related to pretty much all the form fields printed in the home page of the application. The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3. The easiest workaround is to edit the wiki page `Filter.FilterStreamDescriptorForm` (with wiki editor) according to the instructions in the GitHub Security Advisory.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | >=5.4.4<12.10.11 | |
Xwiki | >=13.0<13.4.7 | |
Xwiki | >=13.5<13.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-29258 is classified as moderate.
To fix CVE-2022-29258, update XWiki to version 12.10.11 or later, or 13.10.3 or later.
CVE-2022-29258 affects XWiki versions between 5.4.4 and 12.10.10, as well as versions between 13.0 and 13.4.7, and versions between 13.5 and 13.10.2.
CVE-2022-29258 is a filter-related vulnerability in the XWiki Platform.
Yes, CVE-2022-29258 can be exploited remotely, making it critical to address in affected systems.