First published: Thu Sep 08 2022(Updated: )
The XWiki Platform Index UI is an Index of all pages, attachments, orphans and deleted pages and attachments for XWiki Platform, a generic wiki platform. Prior to versions 13.10.6 and 14.3, it's possible to store JavaScript which will be executed by anyone viewing the deleted attachments index with an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3. As a workaround, modify fix the vulnerability by editing the wiki page `XWiki.DeletedAttachments` with the object editor, open the `JavaScriptExtension` object and apply on the content the changes that can be found on the fix commit.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | >=2.3<13.10.6 | |
Xwiki | >=14.0<14.3 | |
Xwiki | =2.2-milestone1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36096 has a medium severity rating, as it allows the storage and execution of JavaScript in deleted attachments.
To fix CVE-2022-36096, update the XWiki Platform to version 13.10.6 or 14.3 or later.
CVE-2022-36096 affects XWiki versions prior to 13.10.6 and 14.3, including version 2.2-milestone1.
CVE-2022-36096 is a stored cross-site scripting (XSS) vulnerability.
CVE-2022-36096 can allow an attacker to execute malicious JavaScript when users view deleted attachments, potentially compromising user data.