
We found results for “”
CVE-2023-30537
Good to know:

Date: April 16, 2023
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with the right to add an object on a page can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the styles properties "FlamingoThemesCode.WebHome". This page is installed by default. The vulnerability has been patched in XWiki versions 13.10.11, 14.4.7 and 14.10.
Language: Java
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Top Fix

Upgrade Version
Upgrade to version org.xwiki.platform:xwiki-platform-flamingo-theme-ui:13.10.11;org.xwiki.platform:xwiki-platform-flamingo-theme-ui:14.4.7;org.xwiki.platform:xwiki-platform-flamingo-theme-ui:14.10
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | CHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | LOW |