First published: Sun Apr 16 2023(Updated: )
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with edit rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the included pages in the included documents edit panel. The problem has been patched on XWiki 14.4.7, and 14.10.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | >=14.0<14.4.7 | |
Xwiki | =14.10-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29212 is considered a high severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2023-29212, upgrade XWiki to version 14.4.7 or later.
CVE-2023-29212 affects users of XWiki versions from 14.0 up to 14.4.7 and version 14.10-rc1.
CVE-2023-29212 allows authenticated users with edit rights to execute arbitrary Groovy, Python, or Velocity code.
The primary mitigation strategy for CVE-2023-29212 is to restrict edit access to trusted users until an upgrade is performed.