Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to execute a content with the right of any user via a crafted URL. A user must have `programming` privileges in order to exploit this vulnerability. This issue has been patched in XWiki 14.10.7 and 15.2RC1. Users are advised to upgrade. There are no known workarounds for for this vulnerability.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/cf8eb861998ea423c3645d2e5e974420b0e882be
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hgpw-6p4h-j6h5
https://jira.xwiki.org/browse/XWIKI-20386
Related Vulnerabilities
CVE-2021-21266 Vulnerability in maven package org.openhab.addons.bundles:org.openhab.binding.sonos
CVE-2013-4942 Vulnerability in npm package yui
CVE-2022-2900 Vulnerability in npm package parse-url
CVE-2022-31189 Vulnerability in maven package org.dspace:dspace-jspui
CVE-2023-36542 Vulnerability in maven package org.apache.nifi:nifi-dbcp-service