We found results for “”
CVE-2023-26055
Good to know:
Date: March 2, 2023
XWiki Commons are technical libraries common to several other top level XWiki projects. Starting in version 3.1-milestone-1, any user can edit their own profile and inject code, which is going to be executed with programming right. The same vulnerability can also be exploited in all other places where short text properties are displayed, e.g., in apps created using Apps Within Minutes that use a short text field. The problem has been patched on versions 13.10.9, 14.4.4, 14.7RC1.
Language: Java
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Improper Neutralization of Escape, Meta, or Control Sequences
CWE-150Top Fix
Upgrade Version
Upgrade to version org.xwiki.commons:xwiki-commons-xml:13.10.9,14.4.4,14.7
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | CHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |