// For flags

CVE-2024-31988

XWiki Platform CSRF remote code execution through the realtime HTML Converter API

Severity Score

9.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

XWiki Platform is a generic wiki platform. Starting in version 13.9-rc-1 and prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, when the realtime editor is installed in XWiki, it allows arbitrary remote code execution with the interaction of an admin user with programming right. More precisely, by getting an admin user to either visit a crafted URL or to view an image with this URL that could be in a comment, the attacker can get the admin to execute arbitrary XWiki syntax including scripting macros with Groovy or Python code. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.19, 15.5.4 and 15.9. As a workaround, one may update `RTFrontend.ConvertHTML` manually with the patch. This will, however, break some synchronization processes in the realtime editor, so upgrading should be the preferred way on installations where this editor is used.

XWiki Platform es una plataforma wiki genérica. A partir de la versión 13.9-rc-1 y anteriores a las versiones 4.10.19, 15.5.4 y 15.10-rc-1, cuando el editor en tiempo real está instalado en XWiki, permite la ejecución remota de código arbitrario con la interacción de un usuario administrador con programación correcta. Más precisamente, al lograr que un usuario administrador visite una URL manipulada o vea una imagen con esta URL que podría estar en un comentario, el atacante puede lograr que el administrador ejecute sintaxis XWiki arbitraria, incluidas macros de scripts con código Groovy o Python. Esto compromete la confidencialidad, integridad y disponibilidad de toda la instalación de XWiki. Esta vulnerabilidad ha sido parcheada en XWiki 14.10.19, 15.5.4 y 15.9. Como workaround, se puede actualizar `RTFrontend.ConvertHTML` manualmente con el parche. Sin embargo, esto interrumpirá algunos procesos de sincronización en el editor en tiempo real, por lo que la actualización debería ser la forma preferida en instalaciones donde se utiliza este editor.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-04-08 CVE Reserved
  • 2024-04-10 CVE Published
  • 2024-04-11 EPSS Updated
  • 2024-08-13 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Xwiki
Search vendor "Xwiki"
Xwiki-platform
Search vendor "Xwiki" for product "Xwiki-platform"
>= 13.9.0 < 14.10.19
Search vendor "Xwiki" for product "Xwiki-platform" and version " >= 13.9.0 < 14.10.19"
en
Affected
Xwiki
Search vendor "Xwiki"
Xwiki-platform
Search vendor "Xwiki" for product "Xwiki-platform"
>= 15.0.0 < 15.5.4
Search vendor "Xwiki" for product "Xwiki-platform" and version " >= 15.0.0 < 15.5.4"
en
Affected
Xwiki
Search vendor "Xwiki"
Xwiki-platform
Search vendor "Xwiki" for product "Xwiki-platform"
>= 15.6 < 15.9
Search vendor "Xwiki" for product "Xwiki-platform" and version " >= 15.6 < 15.9"
en
Affected