Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-26471
HistoryMar 02, 2023 - 6:28 p.m.

CVE-2023-26471 XWiki Platform users may execute anything with superadmin right through comments and async macro

2023-03-0218:28:52
CWE-284
GitHub_M
www.cve.org
xwiki platform
vulnerability
execution
comments
async macro
superadmin
patch
workaround

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.2%

XWiki Platform is a generic wiki platform. Starting in version 11.6-rc-1, comments are supposed to be executed with the right of superadmin but in restricted mode (anything dangerous is disabled), but the async macro does not take into account the restricted mode. This means that any user with comment right can use the async macro to make it execute any wiki content with the right of superadmin. This has been patched in XWiki 14.9, 14.4.6, and 13.10.10. The only known workaround consists of applying a patch and rebuilding and redeploying org.xwiki.platform:xwiki-platform-rendering-async-macro.

CNA Affected

[
  {
    "vendor": "xwiki",
    "product": "xwiki-platform",
    "versions": [
      {
        "version": ">= 11.6-rc-1, < 13.10.10",
        "status": "affected"
      },
      {
        "version": ">= 14.0, < 14.4.6",
        "status": "affected"
      },
      {
        "version": ">= 14.5, < 14.9",
        "status": "affected"
      }
    ]
  }
]

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.2%

Related for CVELIST:CVE-2023-26471