Wiz Agents & Workflows are here

CVE-2023-40176
Java vulnerability analysis and mitigation

Overview

CVE-2023-40176 is a stored Cross-Site Scripting (XSS) vulnerability in XWiki Platform, discovered in August 2023. The vulnerability affects versions from 4.1M2 up to versions before 14.10.5 and 15.1RC1. XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it (GitHub Advisory, NVD).

Technical details

The vulnerability exists in the timezone user preference functionality of XWiki Platform. While the timezone selection is typically restricted to a dropdown menu, attackers can bypass this restriction using JavaScript through browser developer tools or by directly calling the save URL on the user profile with a crafted query string. The vulnerability stems from insufficient output escaping in the timezone displayer component, where the timezone value is displayed without proper sanitization (GitHub Advisory). The CVSS v3.1 base score is 9.0 CRITICAL according to GitHub's assessment, with a vector string of CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H (NVD).

Impact

When exploited, this vulnerability allows attackers to execute arbitrary JavaScript code in the context of other users who visit the malicious user profile. This can lead to information theft and potential privilege escalation, including the ability to gain programming rights. The attack can affect any user viewing the compromised profile (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in XWiki versions 14.10.5 and 15.1RC1. The fix involves properly escaping the timezone value display using the $escapetool.xml() function in the displayer_timezone.vm template. For older unpatched versions, administrators can manually edit the displayer_timezone.vm file to implement the same escaping mechanism by replacing $!value with $!escapetool.xml($value) (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-34361CRITICAL9.3
  • JavaJava
  • ca.uhn.hapi.fhir:org.hl7.fhir.validation
NoYesMar 30, 2026
CVE-2026-34214HIGH7.7
  • JavaJava
  • trino
NoYesMar 29, 2026
CVE-2026-34359HIGH7.4
  • JavaJava
  • ca.uhn.hapi.fhir:org.hl7.fhir.core
NoYesMar 30, 2026
CVE-2026-34237MEDIUM6.1
  • JavaJava
  • io.modelcontextprotocol.sdk:mcp-core
NoYesMar 30, 2026
CVE-2026-34360MEDIUM5.8
  • JavaJava
  • ca.uhn.hapi.fhir:org.hl7.fhir.core
NoYesMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management