CVE-2023-26474
Java vulnerability analysis and mitigation

Overview

XWiki Platform, a generic wiki platform, contains a critical vulnerability (CVE-2023-26474) that affects versions from 13.10 onwards. The vulnerability allows users to execute text area properties with the rights of an existing document content author, effectively enabling privilege escalation. This issue was discovered in November 2022 and has been patched in XWiki versions 14.10, 14.4.7, and 13.10.11 (GitHub Advisory).

Technical details

The vulnerability stems from TextAreaClass overriding the security document that is explicitly set by $doc.display, causing the system to use the content author's privileges instead of the displayed object's author. This affects any TextAreaClass property with wiki syntax enabled that is displayed using the regular displayer. The vulnerability has been assigned a CVSS v3.1 base score of 9.9 (Critical) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and high impact on confidentiality, integrity, and availability (GitHub Advisory).

Impact

The vulnerability allows attackers with limited privileges to execute code with elevated permissions, potentially leading to unauthorized access to sensitive information and system compromise. For example, an attacker can execute Groovy scripts through the wiki syntax in text areas, even without having script or programming rights (XWIKI Jira).

Mitigation and workarounds

The vulnerability has been patched in XWiki versions 14.10, 14.4.7, and 13.10.11. Users are strongly advised to upgrade to these patched versions as there are no known workarounds for this vulnerability (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-29847HIGH7.5
  • JavaJava
  • org.apache.linkis:linkis
NoYesJan 19, 2026
CVE-2026-1050MEDIUM6.9
  • JavaJava
  • net.risesoft:risenet-y9boot-support-platform-service
NoNoJan 17, 2026
CVE-2025-15104MEDIUM6.9
  • JavaScriptJavaScript
  • vnu-jar
NoNoJan 16, 2026
CVE-2025-59355MEDIUM6.5
  • JavaJava
  • org.apache.linkis:linkis-metadata
NoYesJan 19, 2026
CVE-2026-0858MEDIUM5.1
  • JavaJava
  • net.sourceforge.plantuml:plantuml
NoYesJan 16, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management