First published: Sat Apr 15 2023(Updated: )
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents including the notification preferences macros can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the user parameter of the macro that provide the notification filters. These macros are used in the user profiles and thus installed by default in XWiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | <13.10.11 | |
Xwiki | >=14.4.0<14.4.7 | |
Xwiki | =14.10-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29210 is considered a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2023-29210, upgrade XWiki to version 14.4.7 or later, or to versions before 13.10.11.
CVE-2023-29210 affects XWiki versions prior to 14.4.7 and those between 14.4.0 and 14.4.7, as well as 14.10-rc1.
CVE-2023-29210 allows any user with view rights to execute arbitrary Groovy, Python, or Velocity code.
CVE-2023-29210 involves XWiki Commons and the notification preferences macros within XWiki.