Description
XWiki Commons are technical libraries common to several other top level XWiki projects. Starting in version 3.1-milestone-1, any user can edit their own profile and inject code, which is going to be executed with programming right. The same vulnerability can also be exploited in all other places where short text properties are displayed, e.g., in apps created using Apps Within Minutes that use a short text field. The problem has been patched on versions 13.10.9, 14.4.4, 14.7RC1.
Remediation
References
https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-8cw6-4r32-6r3h
https://jira.xwiki.org/browse/XCOMMONS-2498
https://jira.xwiki.org/browse/XWIKI-19793
https://jira.xwiki.org/browse/XWIKI-19794
Related Vulnerabilities
CVE-2023-39155 Vulnerability in maven package org.jenkins-ci.plugins:chef-identity
CVE-2021-44521 Vulnerability in maven package org.apache.cassandra:cassandra-all
CVE-2023-33201 Vulnerability in maven package org.bouncycastle:bcprov-ext-jdk14
CVE-2017-18869 Vulnerability in maven package org.webjars.npm:chownr
CVE-2022-24197 Vulnerability in maven package com.itextpdf:itext7-core