Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of `Invitation.InvitationCommon`. This page is installed by default. The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this issue.
Remediation
References
https://jira.xwiki.org/browse/XWIKI-20283
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-px54-3w5j-qjg9
https://github.com/xwiki/xwiki-platform/commit/3d055a0a5ec42fdebce4d71ee98f94553fdbfebf
Related Vulnerabilities
CVE-2022-0235 Vulnerability in npm package node-fetch
CVE-2019-18797 Vulnerability in maven package org.webjars.npm:node-sass
CVE-2017-16142 Vulnerability in npm package infraserver
CVE-2018-14732 Vulnerability in npm package webpack-dev-server
CVE-2021-41042 Vulnerability in maven package org.eclipse.lyo:lyo-parent