First published: Sat Apr 15 2023(Updated: )
XWiki Commons are technical libraries common to several other top level XWiki projects. There was no check in the author of a JavaScript xobject or StyleSheet xobject added in a XWiki document, so until now it was possible for a user having only Edit Right to create such object and to craft a script allowing to perform some operations when executing by a user with appropriate rights. This has been patched in XWiki 14.9-rc-1 by only executing the script if the author of it has Script rights.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki Xwiki | >3.0<=14.8 | |
Xwiki Xwiki | =3.0 | |
Xwiki Xwiki | =3.0-milestone_2 | |
Xwiki Xwiki | =3.0-milestone3 | |
Xwiki Xwiki | =3.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-29206 is critical with a score of 5.4.
CVE-2023-29206 allows a user with Edit Right to create a JavaScript xobject or StyleSheet xobject and craft a script, posing a security risk.
Versions 3.0 to 14.8 of XWiki are affected by CVE-2023-29206.
To mitigate CVE-2023-29206, it is recommended to update XWiki to a version that includes the fix provided in the referenced commit or advisory.
More information about CVE-2023-29206 can be found in the linked references.