-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from two key issues in MenuMacro.xml: 1) Direct inclusion of user-controlled content without escaping Velocity/Groovy syntax characters ({}) allowed code macro injection. 2) Unescaped interpolation of parameters into HTML attributes enabled context-appropriate injection vectors. The patch adds escaping through services.rendering.escape(), replaces direct content inclusion with sanitized displayDocument().replace(), and uses {{wikimacrocontent/}} with proper escaping, confirming these were the vulnerable points.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.xwiki.platform:xwiki-platform-menu-ui | maven | < 13.10.8 | 13.10.8 |
| org.xwiki.platform:xwiki-platform-menu-ui | maven | >= 14.0.0, < 14.4.3 | 14.4.3 |
Ongoing coverage of React2Shell