XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to execute a content with the right of any user via a crafted URL. A user must have `programming` privileges in order to exploit this vulnerability. This issue has been patched in XWiki 14.10.7 and 15.2RC1. Users are advised to upgrade. There are no known workarounds for for this vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hgpw-6p4h-j6h5 | Patch Vendor Advisory |
| https://github.com/xwiki/xwiki-platform/commit/cf8eb861998ea423c3645d2e5e974420b0e882be | Patch |
| https://jira.xwiki.org/browse/XWIKI-20386 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
14 Nov 2023, 20:06
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Xwiki xwiki
Xwiki |
|
| CWE | CWE-352 | |
| CPE | cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| References | () https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hgpw-6p4h-j6h5 - Patch, Vendor Advisory | |
| References | () https://jira.xwiki.org/browse/XWIKI-20386 - Issue Tracking, Vendor Advisory | |
| References | () https://github.com/xwiki/xwiki-platform/commit/cf8eb861998ea423c3645d2e5e974420b0e882be - Patch |
07 Nov 2023, 21:36
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-11-07 19:15
Updated : 2023-11-14 20:06
NVD link : CVE-2023-46242
Mitre link : CVE-2023-46242
JSON object : View
Products Affected
xwiki
- xwiki
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
