First published: Tue Apr 18 2023(Updated: )
### Impact Steps to reproduce: 1. As a user without script or programming right, edit your user profile (or any other document) with the wiki editor and add the content `{{groovy}}println("Hello " + "from Groovy!"){{/groovy}}` 1. Edit the document with the object editor and add an object of type AppWithinMinutes.LiveTableClass (no values need to be set, just save) 1. View the document ### Patches The vulnerability has been patched in XWiki 15.0-rc-1 and 14.10.3. ### Workarounds There is no known workaround. ### References https://jira.xwiki.org/browse/XWIKI-20423 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki Xwiki | >=7.4.4<14.10.3 | |
maven/org.xwiki.platform:xwiki-platform-appwithinminutes-ui | >=7.4.4<14.10.3 | 14.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-29527.
The severity of CVE-2023-29527 is critical with a score of 8.8.
The affected software of CVE-2023-29527 is XWiki Platform versions 7.4.4 to 14.10.3.
This vulnerability allows a user without script or programming rights to edit a user profile or any other document with the wiki editor and add groovy script content.
Yes, you can find more information about CVE-2023-29527 in the following references: [GitHub Advisory](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jgrg-qvpp-9vwr) and [XWiki JIRA Issue](https://jira.xwiki.org/browse/XWIKI-20423).