Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of `Invitation.InvitationCommon`. This page is installed by default. The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this issue.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/3d055a0a5ec42fdebce4d71ee98f94553fdbfebf
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-px54-3w5j-qjg9
https://jira.xwiki.org/browse/XWIKI-20283
Related Vulnerabilities
CVE-2019-9155 Vulnerability in maven package org.webjars.npm:openpgp
CVE-2016-3081 Vulnerability in maven package org.apache.struts.xwork:xwork-core
CVE-2021-21361 Vulnerability in maven package com.bmuschko:gradle-vagrant-plugin
CVE-2022-24728 Vulnerability in npm package ckeditor4
CVE-2022-31160 Vulnerability in maven package org.webjars.bower:jquery-ui