CVE-2023-26055

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-26055
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-26055.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-26055
Aliases
Published
2023-03-02T18:48:16.053Z
Modified
2025-12-04T23:43:06.214926Z
Severity
  • 9.9 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
XWiki Commons may allow privilege escalation to programming rights via user's first name
Details

XWiki Commons are technical libraries common to several other top level XWiki projects. Starting in version 3.1-milestone-1, any user can edit their own profile and inject code, which is going to be executed with programming right. The same vulnerability can also be exploited in all other places where short text properties are displayed, e.g., in apps created using Apps Within Minutes that use a short text field. The problem has been patched on versions 13.10.9, 14.4.4, 14.7RC1.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/26xxx/CVE-2023-26055.json",
    "cwe_ids": [
        "CWE-150"
    ]
}
References

Affected packages

Git / github.com/xwiki/xwiki-commons

Affected ranges

Type
GIT
Repo
https://github.com/xwiki/xwiki-commons
Events
Database specific
{
    "versions": [
        {
            "introduced": "3.1-milestone-1"
        },
        {
            "fixed": "13.10.9"
        }
    ]
}
Type
GIT
Repo
https://github.com/xwiki/xwiki-commons
Events
Database specific
{
    "versions": [
        {
            "introduced": "14.0-rc-1"
        },
        {
            "fixed": "14.4.4"
        }
    ]
}
Type
GIT
Repo
https://github.com/xwiki/xwiki-commons
Events
Database specific
{
    "versions": [
        {
            "introduced": "14.5"
        },
        {
            "fixed": "14.7-rc-1"
        }
    ]
}