CWE
863
Advisory Published
Advisory Published
Updated

CVE-2024-38369: XWiki programming rights may be inherited by inclusion

First published: Mon Jun 24 2024(Updated: )

### Impact The content of a document included using `{{include reference="targetdocument"/}}` is executed with the right of the includer and not with the right of its author. This means that any user able to modify the target document can impersonate the author of the content which used the `include` macro. ### Patches This has been patched in XWiki 15.0 RC1 by making the default behavior safe. ### Workarounds Make sure to protect any included document to make sure only allowed users can modify it. A workaround have been provided in 14.10.2 to allow forcing to execute the included content with the target content author instead of the default behavior. See https://extensions.xwiki.org/xwiki/bin/view/Extension/Include%20Macro#HAuthor for more details. ### References https://jira.xwiki.org/browse/XWIKI-5027 https://jira.xwiki.org/browse/XWIKI-20471 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
maven/org.xwiki.platform:xwiki-platform-rendering-macro-include<15.0-rc-1
15.0-rc-1
Xwiki>=1.5<15.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-38369?

    CVE-2024-38369 has a high severity level due to the potential for unauthorized content execution and user impersonation.

  • How do I fix CVE-2024-38369?

    To address CVE-2024-38369, update the xwiki-platform-rendering-macro-include package to version 15.0 or higher.

  • What types of systems are affected by CVE-2024-38369?

    CVE-2024-38369 affects XWiki installations using versions between 1.5 and 15.0-rc-1.

  • What are the implications of CVE-2024-38369?

    The implications of CVE-2024-38369 include potential data integrity issues and the risk of users executing content under an author's credentials.

  • When was CVE-2024-38369 disclosed?

    CVE-2024-38369 was disclosed in 2024 as part of ongoing security assessments of the XWiki platform.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203