First published: Fri Jun 23 2023(Updated: )
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the restore template to perform a XSS, e.g. by using URL such as: > /xwiki/bin/view/XWiki/Main?xpage=restore&showBatch=true&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 9.4-rc-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki Xwiki | >=9.4<14.10.5 | |
Xwiki Xwiki | =9.4 | |
Xwiki Xwiki | =9.4-rc-1 | |
Xwiki Xwiki | =15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35158 is a vulnerability in XWiki Platform that allows users to inject malicious JavaScript code through a specially crafted URL, resulting in a cross-site scripting (XSS) attack.
CVE-2023-35158 has a severity rating of 6.1 (critical).
CVE-2023-35158 affects XWiki Platform versions 9.4, 9.4-rc-1, and 15.0 up to and including version 14.10.5.
To exploit CVE-2023-35158, you can craft a URL with a payload to inject JavaScript code into the page.
Yes, the vulnerability has been fixed in the XWiki Platform with the following commit: d5472100606c8355ed44ada273e91df91f682738.