Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of `Invitation.InvitationCommon`. This page is installed by default. The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this issue.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/3d055a0a5ec42fdebce4d71ee98f94553fdbfebf
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-px54-3w5j-qjg9
https://jira.xwiki.org/browse/XWIKI-20283
Related Vulnerabilities
CVE-2018-1000620 Vulnerability in npm package cryptiles
CVE-2021-23440 Vulnerability in npm package set-value
CVE-2020-1945 Vulnerability in maven package org.apache.ant:ant
CVE-2022-24717 Vulnerability in npm package @finastra/ssr-pages
CVE-2021-45046 Vulnerability in maven package org.apache.logging.log4j:log4j-core