The Document script API returns directly a DocumentAuthors allowing to set any authors to the document, which in consequence can allow subsequent executions of scripts since this author is used for checking rights. Example of such attack:
{{velocity}}
$doc.setContent('{{velocity}}$xcontext.context.authorReference{{/velocity}}')
$doc.authors.setContentAuthor('xwiki:XWiki.superadmin')
$doc.getRenderedContent()
{{/velocity}}
The problem has been patched in XWiki 14.10 and 14.4.7 by returning a safe script API.
There no easy workaround apart of upgrading.
If you have any questions or comments about this advisory: * Open an issue in Jira * Email us at security ML
{ "nvd_published_at": "2023-04-16T07:15:00Z", "github_reviewed_at": "2023-04-12T20:36:28Z", "severity": "CRITICAL", "github_reviewed": true, "cwe_ids": [ "CWE-648" ] }