-
CVSS Score
-The vulnerability stems from improper input sanitization in the LoggingAdmin.xml template. The pre-patch code directly used user-controlled parameters ($request.logger_name) without escaping, enabling attackers to inject Groovy code through template directives. The patch added escaping mechanisms using $services.rendering.escape and $escapetool.java, confirming the vulnerability was in parameter handling. The CSRF aspect allows this injection to be triggered via malicious requests, leading to RCE through eval injection when processing logger names.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.xwiki.platform:xwiki-platform-logging-ui | maven | >= 4.2-milestone-3, < 13.10.11 | 13.10.11 |
| org.xwiki.platform:xwiki-platform-logging-ui | maven | >= 14.0-rc-1, < 14.4.7 | 14.4.7 |
| org.xwiki.platform:xwiki-platform-logging-ui | maven | >= 14.5, < 14.10 | 14.10 |