First published: Thu Mar 02 2023(Updated: )
XWiki Platform is a generic wiki platform. Starting in version 6.2-milestone-1, one can execute any wiki content with the right of IconThemeSheet author by creating an icon theme with certain content. This can be done by creating a new page or even through the user profile for users not having edit right. The issue has been patched in XWiki 14.9, 14.4.6, and 13.10.10. An available workaround is to fix the bug in the page `IconThemesCode.IconThemeSheet` by applying a modification from commit 48caf7491595238af2b531026a614221d5d61f38.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | >=6.2.1<13.10.10 | |
Xwiki | >=14.0<14.4.6 | |
Xwiki | >=14.5<14.9 | |
Xwiki | =6.2-milestone1 | |
Xwiki | =6.2-milestone2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26472 is considered a moderate severity vulnerability due to its ability to allow unauthorized execution of wiki content.
To fix CVE-2023-26472, it is recommended to upgrade XWiki to version 14.4.6 or later, or apply any available security patches.
CVE-2023-26472 affects XWiki versions from 6.2.1 to 13.10.10, as well as versions from 14.0 to 14.4.6, and versions between 14.5 and 14.9.
CVE-2023-26472 is a content execution vulnerability that can be exploited through the creation of a malicious icon theme.
Yes, CVE-2023-26472 can be exploited by creating a new page or through user profiles with the right of IconThemeSheet author.