First published: Sun Apr 16 2023(Updated: )
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with edit rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the included pages in the IncludedDocuments panel. The problem has been patched on XWiki 14.4.7, and 14.10.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | <13.10.11 | |
Xwiki | >=14.4.0<14.4.7 | |
Xwiki | =14.10-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29214 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2023-29214, upgrade your XWiki installation to a version above 13.10.11 or from 14.4.0 and below 14.4.7.
Any user with edit rights on XWiki installations is potentially affected by CVE-2023-29214.
CVE-2023-29214 allows execution of arbitrary Groovy, Python, or Velocity code in affected XWiki installations.
CVE-2023-29214 affects the XWiki Commons libraries used in multiple XWiki projects.