Description
XWiki Platform Web Parent POM contains Web resources for the XWiki platform, a generic wiki platform. Starting with version 1.0 and prior to versions 13.10.6 and 14.30-rc-1, it's possible to store JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3RC1. As a workaround, it is possible to replace `viewattachrev.vm`, the entry point for this attack, by a patched version from the patch without updating XWiki.
Remediation
References
Related Vulnerabilities
WordPress Plugin Unlimited Pop-Ups Multiple Cross-Site Scripting Vulnerabilities (1.4.3)
SharePoint CVE-2025-21393 Vulnerability (CVE-2025-21393)
MySQL CVE-2015-4826 Vulnerability (CVE-2015-4826)
WordPress Deserialization of Untrusted Data Vulnerability (CVE-2018-20148)
WordPress Plugin Comments-wpDiscuz Cross-Site Scripting (3.1.4)