First published: Thu Mar 02 2023(Updated: )
XWiki Platform is a generic wiki platform. Starting in version 11.6-rc-1, comments are supposed to be executed with the right of superadmin but in restricted mode (anything dangerous is disabled), but the async macro does not take into account the restricted mode. This means that any user with comment right can use the async macro to make it execute any wiki content with the right of superadmin. This has been patched in XWiki 14.9, 14.4.6, and 13.10.10. The only known workaround consists of applying a patch and rebuilding and redeploying `org.xwiki.platform:xwiki-platform-rendering-async-macro`.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | >=11.6<13.10.10 | |
Xwiki | >=14.0<14.4.6 | |
Xwiki | >=14.5<14.9 | |
Xwiki | =11.6-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26471 is considered a high severity vulnerability due to the potential execution of arbitrary code.
To fix CVE-2023-26471, you should upgrade to a version of XWiki that is later than 14.4.6 or 14.9 or post the patched versions.
CVE-2023-26471 affects XWiki versions from 11.6-rc1 up to 14.4.6 and 14.9.
CVE-2023-26471 is a code execution vulnerability that can be exploited due to improper handling in restricted mode.
Yes, CVE-2023-26471 can potentially be exploited remotely by leveraging the async macro without proper restrictions.