CVE-2023-26477

XWiki Platform is a generic wiki platform. Starting in versions 6.3-rc-1 and 6.2.4, it's possible to inject arbitrary wiki syntax including Groovy, Python and Velocity script macros via the `newThemeName` request parameter (URL parameter), in combination with additional parameters. This has been patched in the supported versions 13.10.10, 14.9-rc-1, and 14.4.6. As a workaround, it is possible to edit `FlamingoThemesCode.WebHomeSheet` and manually perform the changes from the patch fixing the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*

History

10 Mar 2023, 05:00

Type Values Removed Values Added
CWE CWE-94
CPE cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References (MISC) https://jira.xwiki.org/browse/XWIKI-19757 - (MISC) https://jira.xwiki.org/browse/XWIKI-19757 - Exploit, Issue Tracking, Vendor Advisory
References (MISC) https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x2qm-r4wx-8gpg - (MISC) https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x2qm-r4wx-8gpg - Exploit, Vendor Advisory
References (MISC) https://github.com/xwiki/xwiki-platform/commit/ea2e615f50a918802fd60b09ec87aa04bc6ea8e2#diff-e2153fa59f9d92ef67b0afbf27984bd17170921a3b558fac227160003d0dfd2aR283-R284 - (MISC) https://github.com/xwiki/xwiki-platform/commit/ea2e615f50a918802fd60b09ec87aa04bc6ea8e2#diff-e2153fa59f9d92ef67b0afbf27984bd17170921a3b558fac227160003d0dfd2aR283-R284 - Patch

02 Mar 2023, 18:22

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-02 18:15

Updated : 2024-02-04 23:14


NVD link : CVE-2023-26477

Mitre link : CVE-2023-26477

CVE.ORG link : CVE-2023-26477


JSON object : View

Products Affected

xwiki

  • xwiki
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')