First published: Fri Jun 23 2023(Updated: )
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). For instance, the following URL execute an `alter` on the browser: `<xwiki-host>/xwiki/bin/view/Main/?viewer=share&send=1&target=&target=%3Cimg+src+onerror%3Dalert%28document.domain%29%3E+%3Cimg+src+onerror%3Dalert%28document.domain%29%3E+%3Crenniepak%40intigriti.me%3E&includeDocument=inline&message=I+wanted+to+share+this+page+with+you.`, where `<xwiki-host>` is the URL of your XWiki installation. The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.4, and 14.4.8.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki Xwiki | <14.4.8 | |
Xwiki Xwiki | >=14.10<14.10.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35155 is a vulnerability in XWiki Platform that allows users to inject JavaScript using a specially crafted URL (XSS).
CVE-2023-35155 has a severity rating of high with a CVSS score of 6.1.
The affected software for CVE-2023-35155 is XWiki Platform version 14.4.8 up to, but not including, version 14.10.4.
To fix CVE-2023-35155, it is recommended to upgrade XWiki Platform to version 14.10.4 or later.
The Common Weakness Enumeration (CWE) for CVE-2023-35155 is CWE-79, which is for Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').