CVE-2023-26478
Java vulnerability analysis and mitigation

Overview

CVE-2023-26478 affects XWiki Platform, a generic wiki platform. The vulnerability was discovered in version 14.3-rc-1 and was patched in versions 14.9-rc-1 and 14.4.6. The issue involves the org.xwiki.store.script.TemporaryAttachmentsScriptService#uploadTemporaryAttachment method returning an instance of com.xpn.xwiki.doc.XWikiAttachment, which is not intended to be exposed to users without proper programming rights (GitHub Advisory).

Technical details

The vulnerability stems from a method implementation that returns an XWikiAttachment instance instead of using the proper com.xpn.xwiki.api.Attachment class. The latter class is designed to handle user rights verification before performing potentially dangerous operations. The vulnerability has received a CVSS v3.1 base score of 8.1 (HIGH) from NVD with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N, while GitHub assessed it with a score of 6.6 (MEDIUM) with vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L. The vulnerability is classified as CWE-749 (Exposed Dangerous Method or Function) (NVD).

Impact

The vulnerability could allow users without proper programming rights to access and manipulate sensitive attachment data through the exposed XWikiAttachment class. This exposure could lead to unauthorized operations and potential security breaches in the system (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in XWiki Platform versions 14.9-rc-1 and 14.4.6. The fix involves modifying the TemporaryAttachmentsScriptService to return a proper com.xpn.xwiki.api.Attachment instance instead of the XWikiAttachment class. There are no known workarounds for this issue, and users are advised to upgrade to the patched versions (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-26866HIGH8.8
  • JavaJava
  • org.apache.hugegraph:hg-pd-core
NoYesDec 12, 2025
CVE-2025-54981HIGH7.5
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025
CVE-2025-67721MEDIUM6.3
  • JavaJava
  • trino
NoYesDec 12, 2025
CVE-2025-53960MEDIUM5.9
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025
CVE-2025-54947MEDIUM5.3
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management