First published: Tue Apr 18 2023(Updated: )
### Impact It's possible to break many translations coming from wiki pages by creating a corrupted document containing a translation object. ### Patches The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. ### Workarounds There is no other workaround other than fixing any way to create a document that fail to load. ### References https://jira.xwiki.org/browse/XWIKI-20460 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki Xwiki | <13.10.11 | |
Xwiki Xwiki | >=14.0<14.4.8 | |
Xwiki Xwiki | >=14.5<14.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The impact of CVE-2023-29520 is the possibility of breaking translations from wiki pages by creating a corrupted document containing a translation object.
You can fix CVE-2023-29520 by applying the patches provided in XWiki versions 15.0-rc-1, 14.10.1, 14.4.8, or 13.10.11.
There are no known workarounds for CVE-2023-29520.
The severity of CVE-2023-29520 is medium, with a CVSS score of 6.5.
You can find more information about CVE-2023-29520 in the following references: [GitHub Advisory](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9jq5-xwqw-q8j3), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-29520), [XWiki JIRA](https://jira.xwiki.org/browse/XWIKI-20460).