First published: Fri Jun 23 2023(Updated: )
XWiki Platform is a generic wiki platform. Starting in version 5.4.4 and prior to versions 14.4.8, 14.10.4, and 15.0, a stored cross-site scripting vulnerability can be exploited by users with edit rights by adding a `AppWithinMinutes.FormFieldCategoryClass` class on a page and setting the payload on the page title. Then, any user visiting `/xwiki/bin/view/AppWithinMinutes/ClassEditSheet` executes the payload. The issue has been patched in XWiki 14.4.8, 14.10.4, and 15.0. As a workaround, update `AppWithinMinutes.ClassEditSheet` with a patch.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki Xwiki | >=5.4.4<14.4.8 | |
Xwiki Xwiki | >=14.10<14.10.4 | |
Xwiki Xwiki | =15.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35153 is a stored cross-site scripting vulnerability in XWiki Platform.
CVE-2023-35153 has a severity rating of 5.4, which is considered critical.
Versions prior to 14.4.8, 14.10.4, and 15.0-rc1 of XWiki Platform are affected by CVE-2023-35153.
CVE-2023-35153 can be exploited by users with edit rights by adding a specific class on a page and setting a payload.
Yes, you can find references for CVE-2023-35153 at the following links: [GitHub Commit](https://github.com/xwiki/xwiki-platform/commit/1b87fec1e5b5ec00b7a8c3c3f94f6c5e22547392#diff-79e725ec7125cced7d302e1a1f955a76745af26ef28a148981b810e85335d302), [GitHub Advisory](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4wc6-hqv9-qc97), [Jira Ticket](https://jira.xwiki.org/browse/XWIKI-20365).