XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A user without script/programming right can trick a user with elevated rights to edit a content with a malicious payload using a WYSIWYG editor. The user with elevated rights is not warned beforehand that they are going to edit possibly dangerous content. The payload is executed at edit time. This vulnerability has been patched in XWiki 15.10RC1.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-f963-4cq8-2gw7 | Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-20331 | Issue Tracking Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-21311 | Issue Tracking Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-21481 | Issue Tracking Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-21482 | Issue Tracking Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-21483 | Issue Tracking Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-21484 | Issue Tracking Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-21485 | Issue Tracking Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-21486 | Issue Tracking Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-21487 | Issue Tracking Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-21488 | Issue Tracking Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-21489 | Issue Tracking Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-21490 | Issue Tracking Vendor Advisory |
Configurations
History
20 Aug 2024, 16:09
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-862 | |
CPE | cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* | |
References | () https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-f963-4cq8-2gw7 - Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-20331 - Issue Tracking, Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-21311 - Issue Tracking, Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-21481 - Issue Tracking, Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-21482 - Issue Tracking, Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-21483 - Issue Tracking, Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-21484 - Issue Tracking, Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-21485 - Issue Tracking, Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-21486 - Issue Tracking, Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-21487 - Issue Tracking, Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-21488 - Issue Tracking, Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-21489 - Issue Tracking, Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-21490 - Issue Tracking, Vendor Advisory | |
Summary |
|
|
First Time |
Xwiki
Xwiki xwiki |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.0 |
19 Aug 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-19 17:15
Updated : 2024-08-20 16:09
NVD link : CVE-2024-43401
Mitre link : CVE-2024-43401
CVE.ORG link : CVE-2024-43401
JSON object : View
Products Affected
xwiki
- xwiki