First published: Thu Mar 02 2023(Updated: )
XWiki Platform is a generic wiki platform. Starting in version 2.3-milestone-1, the annotation displayer does not execute the content in a restricted context. This allows executing anything with the right of the author of any document by annotating the document. This has been patched in XWiki 13.10.11, 14.4.7 and 14.10. There is no easy workaround except to upgrade.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | >2.3<13.10.11 | |
Xwiki | >=14.0<14.4.7 | |
Xwiki | >=14.5<14.10 | |
Xwiki | =2.3-milestone1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26475 has been classified with a high severity due to its potential for unauthorized actions by document authors.
To fix CVE-2023-26475, you should update to the patched versions of XWiki that address this vulnerability.
CVE-2023-26475 affects XWiki versions between 2.3-milestone-1 and 14.4.7, as well as certain versions within this range.
CVE-2023-26475 is a security vulnerability that allows execution of content in an improper context based on document annotation.
Attackers can exploit CVE-2023-26475 to execute arbitrary code or actions as the author of a document due to improper context restrictions.