First published: Thu Dec 19 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of XWiki.org XWiki. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8.
Affected Software | Affected Version | How to fix |
---|---|---|
XWiki |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-1697 is rated at 9.8 on the CVSS scale, indicating a critical vulnerability.
To fix ZDI-24-1697, update your XWiki installation to the latest version provided by the vendor.
ZDI-24-1697 is a remote code execution vulnerability that allows attackers to execute arbitrary code.
No, authentication is not required to exploit ZDI-24-1697, making it particularly dangerous.
ZDI-24-1697 affects installations of XWiki.org XWiki.