
Cloud Vulnerability DB
A community-led vulnerabilities database
XWiki Platform, a generic wiki platform, contains a critical vulnerability (CVE-2023-26474) that affects versions from 13.10 onwards. The vulnerability allows users to execute text area properties with the rights of an existing document content author, effectively enabling privilege escalation. This issue was discovered in November 2022 and has been patched in XWiki versions 14.10, 14.4.7, and 13.10.11 (GitHub Advisory).
The vulnerability stems from TextAreaClass overriding the security document that is explicitly set by $doc.display, causing the system to use the content author's privileges instead of the displayed object's author. This affects any TextAreaClass property with wiki syntax enabled that is displayed using the regular displayer. The vulnerability has been assigned a CVSS v3.1 base score of 9.9 (Critical) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and high impact on confidentiality, integrity, and availability (GitHub Advisory).
The vulnerability allows attackers with limited privileges to execute code with elevated permissions, potentially leading to unauthorized access to sensitive information and system compromise. For example, an attacker can execute Groovy scripts through the wiki syntax in text areas, even without having script or programming rights (XWIKI Jira).
The vulnerability has been patched in XWiki versions 14.10, 14.4.7, and 13.10.11. Users are strongly advised to upgrade to these patched versions as there are no known workarounds for this vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."