Description
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with edit rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the included pages in the included documents edit panel. The problem has been patched on XWiki 14.4.7, and 14.10.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/22f249a0eb9f2a64214628217e812a994419b69f#diff-a51a252f0190274464027342b4e3eafc4ae32de4d9c17ef166e54fc5454c5689R214-R217
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c5f4-p5wv-2475
https://jira.xwiki.org/browse/XWIKI-20293
Related Vulnerabilities
CVE-2023-40342 Vulnerability in maven package org.jenkins-ci.plugins:flaky-test-handler
CVE-2014-1904 Vulnerability in maven package org.springframework:spring-webmvc
CVE-2020-7754 Vulnerability in maven package org.webjars.npm:npm-user-validate
CVE-2023-31141 Vulnerability in maven package org.opensearch.plugin:opensearch-security
CVE-2023-49656 Vulnerability in maven package org.jenkins-ci.plugins:matlab