First published: Wed Apr 30 2025(Updated: )
### Impact Anyone can access the metadata of any attachment in the wiki using the wiki attachment REST endpoint. It's not filtering the result depending on current user rights, a not authenticated user could exploit this even in a totally private wiki. To reproduce: * remove view from guest on the whole wiki * logout * access http://127.0.0.1:8080/xwiki/rest/wikis/xwiki/attachments You get a list of attachments, while the expected result should be an empty list. ### Patches This vulnerability has been fixed in XWiki 14.10.22, 15.10.12, 16.7.0-rc-1 and 16.4.3. ### Workarounds We're not aware of any workaround except upgrading. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution Issue reported by Lukas Monert.
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.xwiki.platform:xwiki-platform-rest-server | >=16.5.0-rc-1<16.7.0 | 16.7.0 |
maven/org.xwiki.platform:xwiki-platform-rest-server | >=16.0.0-rc-1<16.4.3 | 16.4.3 |
maven/org.xwiki.platform:xwiki-platform-rest-server | >=15.0-rc-1<15.10.12 | 15.10.12 |
maven/org.xwiki.platform:xwiki-platform-rest-server | >=1.8.1<14.10.22 | 14.10.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-r5cr-xm48-97xp is critical due to unauthorized access to metadata of any attachment.
To fix GHSA-r5cr-xm48-97xp, update the xwiki-platform-rest-server to one of the following versions: 16.7.0, 16.4.3, 15.10.12, or 14.10.22.
GHSA-r5cr-xm48-97xp affects xwiki-platform-rest-server versions between 14.10.22 and 16.7.0 inclusive.
Yes, unauthorized users can exploit GHSA-r5cr-xm48-97xp to access metadata in private wikis.
GHSA-r5cr-xm48-97xp is a vulnerability related to improper access control in the wiki attachment REST endpoint.