Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to execute a content with the right of any user via a crafted URL. A user must have `programming` privileges in order to exploit this vulnerability. This issue has been patched in XWiki 14.10.7 and 15.2RC1. Users are advised to upgrade. There are no known workarounds for for this vulnerability.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/cf8eb861998ea423c3645d2e5e974420b0e882be
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hgpw-6p4h-j6h5
https://jira.xwiki.org/browse/XWIKI-20386
Related Vulnerabilities
CVE-2022-25766 Vulnerability in npm package ungit
CVE-2017-2608 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2021-23490 Vulnerability in npm package parse-link-header
CVE-2023-40582 Vulnerability in npm package find-exec
CVE-2023-49068 Vulnerability in maven package org.apache.dolphinscheduler:dolphinscheduler-api