First published: Sat Apr 15 2023(Updated: )
XWiki Commons are technical libraries common to several other top level XWiki projects. The HTML macro does not systematically perform a proper neutralization of script-related html tags. As a result, any user able to use the html macro in XWiki, is able to introduce an XSS attack. This can be particularly dangerous since in a standard wiki, any user is able to use the html macro directly in their own user profile page. The problem has been patched in XWiki 14.8RC1. The patch involves the HTML macros and are systematically cleaned up whenever the user does not have the script correct.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
XWiki | <=14.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29205 is classified as a high-severity vulnerability due to its potential for XSS attacks.
To fix CVE-2023-29205, update XWiki to version 14.8 or later where the HTML macro has been properly secured.
Any XWiki user with access to the HTML macro in versions up to 14.7 is potentially affected by CVE-2023-29205.
CVE-2023-29205 is an XSS (Cross-Site Scripting) vulnerability that allows untrusted content to be executed in a user's browser.
Yes, CVE-2023-29205 can be exploited remotely by malicious users who have access to utilize the HTML macro in XWiki.