// For flags

CVE-2023-46732

Reflected Cross-site scripting through revision parameter in content menu in XWiki Platform

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki is vulnerable to reflected cross-site scripting (RXSS) via the `rev` parameter that is used in the content of the content menu without escaping. If an attacker can convince a user to visit a link with a crafted parameter, this allows the attacker to execute arbitrary actions in the name of the user, including remote code (Groovy) execution in the case of a user with programming right, compromising the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.6 RC1, 15.5.1 and 14.10.14. The patch in commit `04e325d57` can be manually applied without upgrading (or restarting) the instance. Users are advised to upgrade or to manually apply the patch. There are no known workarounds for this vulnerability.

XWiki Platform es una plataforma wiki genérica que ofrece servicios de ejecución para aplicaciones creadas sobre ella. XWiki es vulnerable a Reflected Cross-Site Scripting (RXSS) a través del parámetro "rev" que se utiliza en el contenido del menú de contenido sin escapar. Si un atacante puede convencer a un usuario para que visite un enlace con un parámetro manipulado, esto le permitirá ejecutar acciones arbitrarias en nombre del usuario, incluida la ejecución remota de código (Groovy) en el caso de un usuario con derechos de programación, comprometiendo la confidencialidad, integridad y disponibilidad de toda la instalación de XWiki. Esto ha sido parcheado en XWiki 15.6 RC1, 15.5.1 y 14.10.14. El parche en el commit `04e325d57` se puede aplicar manualmente sin actualizar (o reiniciar) la instancia. Se recomienda a los usuarios que actualicen o apliquen manualmente el parche. No se conocen workarounds para esta vulnerabilidad.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-10-25 CVE Reserved
  • 2023-11-06 CVE Published
  • 2024-09-05 CVE Updated
  • 2024-09-05 First Exploit
  • 2024-11-12 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Xwiki
Search vendor "Xwiki"
Xwiki
Search vendor "Xwiki" for product "Xwiki"
>= 9.7 < 14.10.14
Search vendor "Xwiki" for product "Xwiki" and version " >= 9.7 < 14.10.14"
-
Affected
Xwiki
Search vendor "Xwiki"
Xwiki
Search vendor "Xwiki" for product "Xwiki"
>= 15.0 < 15.5.1
Search vendor "Xwiki" for product "Xwiki" and version " >= 15.0 < 15.5.1"
-
Affected