Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to execute a content with the right of any user via a crafted URL. A user must have `programming` privileges in order to exploit this vulnerability. This issue has been patched in XWiki 14.10.7 and 15.2RC1. Users are advised to upgrade. There are no known workarounds for for this vulnerability.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/cf8eb861998ea423c3645d2e5e974420b0e882be
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hgpw-6p4h-j6h5
https://jira.xwiki.org/browse/XWIKI-20386
Related Vulnerabilities
CVE-2023-32262 Vulnerability in maven package org.jenkins-ci.plugins:dimensionsscm
CVE-2018-20000 Vulnerability in maven package org.bedework:bw-webdav
CVE-2023-33201 Vulnerability in maven package org.bouncycastle:bcprov-jdk15on
CVE-2017-16226 Vulnerability in maven package org.webjars.npm:static-eval