First published: Tue Mar 07 2023(Updated: )
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit rights on a document can trigger an XAR import on a forged XAR file, leading to the ability to display the content of any file on the XWiki server host. This vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10-rc-1. Users are advised to upgrade. Users unable to upgrade may apply the patch `e3527b98fd` manually.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | >1.1<13.10.11 | |
Xwiki | >=14.0<14.4.7 | |
Xwiki | >=14.5<14.10 | |
Xwiki | =1.1-milestone3 | |
Xwiki | =1.1-milestone4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-27480 is considered high due to its potential impact on user data and security.
To fix CVE-2023-27480, upgrade to XWiki version 14.4.8 or later, or any version beyond the affected ranges.
CVE-2023-27480 affects any user with edit rights on documents in specific versions of XWiki Platform.
CVE-2023-27480 is a vulnerability that allows users to exploit file imports via forged XAR files.
The potential consequences of CVE-2023-27480 include unauthorized access to sensitive files and data leakage.