First published: Wed Nov 23 2022(Updated: )
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to make XWiki create many new schemas and fill them with tables just by using a crafted user identifier in the login form. This may lead to degraded database performance. The problem has been patched in XWiki 13.10.8, 14.6RC1 and 14.4.2. Users are advised to upgrade. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | <13.10.8 | |
Xwiki | >=14.0.0<14.4.2 | |
Xwiki | >=14.5.0<14.6 | |
Xwiki | =14.4.3 | |
Xwiki | =14.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41932 is considered a high-severity vulnerability due to its potential impact on database performance.
To fix CVE-2022-41932, upgrade to XWiki version 14.4.4 or later, or any version above 13.10.8 that does not contain the vulnerability.
The affected versions of XWiki include all versions up to 13.10.8, as well as versions from 14.0.0 to 14.4.2 and from 14.5.0 to 14.6.
CVE-2022-41932 allows attackers to use a crafted user identifier in the login form to create multiple new schemas in the XWiki database.
CVE-2022-41932 is a remote vulnerability since it can be exploited through the web interface of the XWiki application.