First published: Mon Aug 19 2024(Updated: )
### Impact A user without script/programming right can trick a user with elevated rights to edit a content with a malicious payload using a WYSIWYG editor. The user with elevated rights is not warned beforehand that they are going to edit possibly dangerous content. The payload is executed at edit time. ### Patches This vulnerability has been patched in XWiki 15.10RC1. ### Workarounds No workaround. It is advised to upgrade to XWiki 15.10+. ### References * https://jira.xwiki.org/browse/XWIKI-20331 * https://jira.xwiki.org/browse/XWIKI-21311 * https://jira.xwiki.org/browse/XWIKI-21481 * https://jira.xwiki.org/browse/XWIKI-21482 * https://jira.xwiki.org/browse/XWIKI-21483 * https://jira.xwiki.org/browse/XWIKI-21484 * https://jira.xwiki.org/browse/XWIKI-21485 * https://jira.xwiki.org/browse/XWIKI-21486 * https://jira.xwiki.org/browse/XWIKI-21487 * https://jira.xwiki.org/browse/XWIKI-21488 * https://jira.xwiki.org/browse/XWIKI-21489 * https://jira.xwiki.org/browse/XWIKI-21490 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution This vulnerability has been reported on Intigriti by @floerer
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.xwiki.platform:xwiki-platform-web-templates | <15.10-rc-1 | 15.10-rc-1 |
Xwiki | <=15.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43401 is considered a high-severity vulnerability due to the potential for exploitation by malicious users.
To fix CVE-2024-43401, update to a secure version of the affected software beyond version 15.10-rc-1 or apply any available patches.
CVE-2024-43401 affects XWiki versions up to and including 15.9, as well as version 15.10-rc-1 of the xwiki-platform-web-templates package.
A user without script or programming rights can exploit CVE-2024-43401 by tricking a user with elevated rights to edit content containing a malicious payload.
The impact of CVE-2024-43401 is that it allows unauthorized content edits by users with elevated rights, potentially leading to execution of harmful scripts.