CVE-2023-29512: xwiki-platform-web-templates vulnerable to Eval Injection
9.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.83504%
CWE
Published
4/20/2023
Updated
11/4/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.xwiki.platform:xwiki-platform-web-templates | maven | >= 1.0B1, < 13.10.11 | 13.10.11 |
org.xwiki.platform:xwiki-platform-web-templates | maven | >= 14.0-rc-1, < 14.4.8 | 14.4.8 |
org.xwiki.platform:xwiki-platform-web-templates | maven | >= 14.5, < 14.10.1 | 14.10.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing output escaping in Velocity templates that process user-controlled input from XAR attachments. The patch adds $escapetool.xml()
escaping to numerous variables that render: 1) Localization strings with dynamic keys, 2) Package metadata fields, 3) Attachment filenames, and 4) User-provided document names. These unescaped outputs in imported.vm
, importinline.vm
and packagelist.vm
templates allowed injection of arbitrary code into the rendered HTML, which could then be interpreted as Velocity/Groovy code due to XWiki's template processing flow. The high confidence comes from direct correlation between patched locations and security advisory descriptions of injection vectors.