First published: Sun Apr 16 2023(Updated: )
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights `WikiManager.DeleteWiki` can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the `wikiId` url parameter. The problem has been patched on XWiki 13.10.11, 14.4.7, and 14.10.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | <13.10.11 | |
Xwiki | >=14.4.0<14.4.7 | |
Xwiki | =14.10-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29211 is classified as a critical vulnerability due to its ability to allow arbitrary code execution.
To fix CVE-2023-29211, upgrade XWiki to versions 13.10.11, or any version from 14.4.8 onwards.
CVE-2023-29211 affects users with view rights `WikiManager.DeleteWiki` in specified versions of XWiki.
CVE-2023-29211 allows attackers to execute arbitrary Groovy, Python, or Velocity code.
No official workaround is recommended for CVE-2023-29211; upgrading to a secure version is advised.