First published: Tue Nov 22 2022(Updated: )
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The `modifications` rest endpoint does not filter out entries according to the user's rights. Therefore, information hidden from unauthorized users are exposed though the `modifications` rest endpoint (comments and page names etc). Users should upgrade to XWiki 14.6+, 14.4.3+, or 13.10.8+. Older versions have not been patched. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki Xwiki | >=8.1<13.10.8 | |
Xwiki Xwiki | >=14.0<14.4.3 | |
Xwiki Xwiki | >=14.5<14.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41936 is a vulnerability in the XWiki Platform that allows unauthorized users to access hidden information through the modifications rest endpoint.
CVE-2022-41936 affects XWiki versions between 8.1 and 13.10.8, as well as versions between 14.0 and 14.4.3, and versions 14.5 to 14.6.
The severity of CVE-2022-41936 is high, with a CVSSv3 base score of 7.5.
To fix CVE-2022-41936, it is recommended to upgrade to a patched version of XWiki Platform or apply the necessary security patches.
You can find more information about CVE-2022-41936 in the XWiki Platform's GitHub repository, security advisories, and the XWiki JIRA issue.