Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions of `org.xwiki.platform:xwiki-platform-logging-ui` it is possible to trick a user with programming rights into visiting a constructed url where e.g., by embedding an image with this URL in a document that is viewed by a user with programming rights which will evaluate an expression in the constructed url and execute it. This issue has been addressed in versions 13.10.11, 14.4.7, and 14.10. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/49fdfd633ddfa346c522d2fe71754dc72c9496ca
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4655-wh7v-3vmg
https://jira.xwiki.org/browse/XWIKI-20291
Related Vulnerabilities
CVE-2023-34234 Vulnerability in npm package @openzeppelin/contracts
CVE-2023-29003 Vulnerability in npm package @sveltejs/kit
CVE-2023-35167 Vulnerability in npm package remult
CVE-2023-46242 Vulnerability in maven package org.xwiki.platform:xwiki-platform-oldcore
CVE-2018-3721 Vulnerability in maven package org.webjars.npm:lodash.mergewith