
We found results for “”
CVE-2024-56158
Good to know:

Date: June 12, 2025
XWiki is a generic wiki platform. It's possible to execute any SQL query in Oracle by using the function like DBMS_XMLGEN or DBMS_XMLQUERY. The XWiki query validator does not sanitize functions that would be used in a simple select and Hibernate allows using any native function in an HQL query. This vulnerability is fixed in 16.10.2, 16.4.7, and 15.10.16.
Severity Score
Severity Score
Weakness Type (CWE)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE-89Top Fix

Upgrade Version
Upgrade to version org.xwiki.platform:xwiki-platform-oldcore:16.10.2;org.xwiki.platform:xwiki-platform-oldcore:16.4.7;org.xwiki.platform:xwiki-platform-oldcore:15.10.16;org.xwiki.platform:xwiki-platform-oldcore:15.10.16;org.xwiki.platform:xwiki-platform-oldcore:16.4.7;org.xwiki.platform:xwiki-platform-oldcore:16.10.2
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |