First published: Thu Jun 22 2023(Updated: )
### Impact It's possible to perform an XSS by forging a request to a delete attachment action with a specific attachment name. Now this XSS can be exploited only if the attacker knows the CSRF token of the user, or if the user ignores the warning about the missing CSRF token. ### Patches The vulnerability has been patched in XWiki 15.1-rc-1 and XWiki 14.10.6. ### Workarounds There's no workaround for this other than upgrading XWiki. ### References * Jira ticket: https://jira.xwiki.org/browse/XWIKI-20339 * Commit containing the fix: https://github.com/xwiki/xwiki-platform/commit/35e9073ffec567861e0abeea072bd97921a3decf ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki Xwiki | <14.10.6 | |
Xwiki Xwiki | =15.0 | |
maven/org.xwiki.platform:xwiki-platform-oldcore | >=15.0-rc-0<15.1-rc-1 | 15.1-rc-1 |
maven/org.xwiki.platform:xwiki-platform-oldcore | >=3.2-milestone-3<14.10.6 | 14.10.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35157 is a vulnerability in XWiki Platform, a generic wiki platform, that allows for cross-site scripting (XSS) attacks by forging a request to delete an attachment with a specific name.
CVE-2023-35157 has a severity rating of high (4.8).
CVE-2023-35157 can only be exploited if the attacker knows the CSRF token of the target XWiki Platform instance.
XWiki Platform versions up to 14.10.6 and version 15.0 are affected by CVE-2023-35157.
Yes, a fix for CVE-2023-35157 is available in the XWiki Platform commit 35e9073ffec567861e0abeea072bd97921a3decf.