Description
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with edit rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the included pages in the included documents edit panel. The problem has been patched on XWiki 14.4.7, and 14.10.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/22f249a0eb9f2a64214628217e812a994419b69f#diff-a51a252f0190274464027342b4e3eafc4ae32de4d9c17ef166e54fc5454c5689R214-R217
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c5f4-p5wv-2475
https://jira.xwiki.org/browse/XWIKI-20293
Related Vulnerabilities
CVE-2020-9482 Vulnerability in maven package org.apache.nifi.registry:nifi-registry-web-api
CVE-2021-39167 Vulnerability in npm package @openzeppelin/contracts
CVE-2021-22112 Vulnerability in maven package org.springframework.security:spring-security-core
CVE-2023-5245 Vulnerability in maven package ml.combust.bundle:bundle-ml_2.12
CVE-2021-21293 Vulnerability in maven package org.http4s:blaze-core_2.13