A stored XSS can be exploited by users with edit rights by adding a AppWithinMinutes.FormFieldCategoryClass class on a page and setting the payload on the page title.
Then, any user visiting /xwiki/bin/view/AppWithinMinutes/ClassEditSheet executes the payload.
See https://jira.xwiki.org/browse/XWIKI-20365 for me details.
The issue has been patched on XWiki 14.4.8, 14.10.4, and 15.0 ?
The issue can be fixed by updating AppWithinMinutes.ClassEditSheet with this patch.
If you have any questions or comments about this advisory:
This vulnerability has been reported on Intigriti by René de Sain @renniepak.
{
"github_reviewed": true,
"cwe_ids": [
"CWE-79",
"CWE-80"
],
"github_reviewed_at": "2023-06-20T16:47:13Z",
"nvd_published_at": "2023-06-23T18:15:13Z",
"severity": "CRITICAL"
}