First published: Tue Nov 22 2022(Updated: )
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The application allows anyone with view access to modify any page of the wiki by importing a crafted XAR package. The problem has been patched in XWiki 14.6RC1, 14.6 and 13.10.8. As a workaround, setting the right of the page Filter.WebHome and making sure only the main wiki administrators can view the application installed on main wiki or edit the page and apply the changed described in commit fb49b4f.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | <13.10.8 | |
Xwiki | >=14.0<14.4.3 | |
Xwiki | =14.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41937 has been classified as a medium-severity vulnerability.
To fix CVE-2022-41937, upgrade to XWiki version 14.6RC1, 14.6, or 13.10.8.
CVE-2022-41937 allows an attacker with view access to modify any wiki page by importing a crafted XAR package.
Versions of XWiki from 14.0 up to 14.4.3, along with 14.5 and earlier than 13.10.8 are affected by CVE-2022-41937.
Yes, CVE-2022-41937 has been publicly disclosed and documented in various advisories.