CVE-2022-41930:
Missing Authorization to enable or disable users in org.xwiki.platform:xwiki-platform-user-profile-ui
9.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.58962%
CWE
Published
11/21/2022
Updated
1/22/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.xwiki.platform:xwiki-platform-user-profile-ui | maven | >= 12.4, < 13.10.7 | 13.10.7 |
org.xwiki.platform:xwiki-platform-user-profile-ui | maven | >= 14.0.0, < 14.4.2 | 14.4.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing authorization checks in the Velocity template code that processes enable/disable actions. The original code (before patch) only validated CSRF token and user existence, but didn't check: 1) If the requester has admin privileges ($hasAdmin
), and 2) If the target user is the current user ($isCurrentUser
). The commit diff shows these checks were added in the conditional statement that gates the enable/disable functionality. The file path is explicitly shown in the commit diff, and the CWE-862 (Missing Authorization) classification directly maps to these missing security checks in the template's control flow.