Description
In XWiki before versions 11.10.5 or 12.2.1, any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. The only workaround is to give SCRIPT right only to trusted users.
Remediation
References
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7qw5-pqhc-xm4g
Related Vulnerabilities
CVE-2017-5858 Vulnerability in npm package converse.js
CVE-2020-5258 Vulnerability in maven package org.webjars.bowergithub.dojo:dojo
CVE-2019-16148 Vulnerability in maven package org.sakaiproject:chat-base
CVE-2018-14042 Vulnerability in maven package org.webjars:bootstrap
CVE-2020-17532 Vulnerability in maven package org.apache.servicecomb:foundation-config