CVE-2023-29519: org.xwiki.platform:xwiki-platform-attachment-ui vulnerable to Code Injection
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.93618%
CWE
Published
4/20/2023
Updated
11/4/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.xwiki.platform:xwiki-platform-attachment-ui | maven | >= 3.0-rc-1, < 13.10.11 | 13.10.11 |
| org.xwiki.platform:xwiki-platform-attachment-ui | maven | >= 14.0-rc-1, < 14.4.8 | 14.4.8 |
| org.xwiki.platform:xwiki-platform-attachment-ui | maven | >= 14.5, < 14.10.2 | 14.10.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unescaped user input in Velocity template-generated HTML. The commit patch adds XML escaping via $escapetool.xml() to the 'name' and 'value' attributes of the hidden input field. The affected code was directly inserting ${classname}${object}${property} and ${propValue} into the HTML output, making it susceptible to code injection when these values contain malicious payloads. The file path and injection pattern match both the CWE-74 description and the provided diff.