Description
XWiki is a generic wiki platform offering runtime services for applications built on top of it. When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file. This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser. Users are advised to update or to disallow uploads of SVG files.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/5853d492b3a274db0d94d560e2a5ea988a271c62
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9jq9-c2cv-pcrj
https://jira.xwiki.org/browse/XWIKI-18368
https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Attachments#HAttachmentdisplayordownload
Related Vulnerabilities
CVE-2022-21227 Vulnerability in npm package sqlite3
CVE-2023-25805 Vulnerability in npm package versionn
CVE-2022-35912 Vulnerability in maven package org.grails:grails-databinding
CVE-2022-24613 Vulnerability in maven package com.drewnoakes:metadata-extractor
CVE-2018-20677 Vulnerability in maven package org.webjars.npm:bootstrap-sass