-
CVSS Score
-The vulnerability stemmed from how feed content was handled in generateEntries(). Pre-patch code created a RawBlock with SyndEntry's description value using Syntax.XHTML_1_0 without sanitization (visible in the diff where 'cleanHTML()' was added post-patch). This direct injection of unprocessed user-controlled HTML input enabled XSS. The commit introduced HTMLCleaner usage to sanitize content, confirming the vulnerable flow was in this method.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.xwiki.platform:xwiki-core-rendering-macro-rss | maven | >= 1.8, <= 3.0.1 | |
| org.xwiki.platform:xwiki-platform-rendering-macro-rss | maven | < 14.6-rc-1 | 14.6-rc-1 |
A Semantic Attack on Google Gemini - Read the Latest Research