CVE-2023-29511

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-29511
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-29511.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-29511
Aliases
Published
2023-04-16T07:07:53Z
Modified
2025-10-14T14:35:11Z
Severity
  • 9.9 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L CVSS Calculator
Summary
xwiki-platform-administration-ui vulnerable to privilege escalation
Details

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit rights on a page (e.g., it's own user page), can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the section ids in XWiki.AdminFieldsDisplaySheet. This page is installed by default. The vulnerability has been patched in XWiki versions 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11.

References

Affected packages

Git / github.com/xwiki/xwiki-platform

Affected ranges

Type
GIT
Repo
https://github.com/xwiki/xwiki-platform
Events
Type
GIT
Repo
https://github.com/xwiki/xwiki-platform
Events
Type
GIT
Repo
https://github.com/xwiki/xwiki-platform
Events