CVE-2023-29525:
XWiki Platform vulnerable to privilege escalation from view right on XWiki.Notifications.Code.LegacyNotificationAdministration
10
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
4/20/2023
Updated
11/4/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.xwiki.platform:xwiki-platform-distribution-war | maven | >= 12.6.1, < 13.10.11 | 13.10.11 |
org.xwiki.platform:xwiki-platform-distribution-war | maven | >= 14.0-rc-1, < 14.4.8 | 14.4.8 |
org.xwiki.platform:xwiki-platform-distribution-war | maven | >= 14.5, < 14.6-rc-1 | 14.6-rc-1 |
org.xwiki.platform:xwiki-platform-legacy-events-hibernate-ui | maven | >= 14.6-rc-1, < 14.10.3 | 14.10.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper output encoding in the LegacyNotificationAdministration template. The unescaped $!request.since
parameter in the date input field allows attackers to inject XWiki syntax. The patch adds $escapetool.xml()
to sanitize the input, confirming this was the vulnerable point. The template's role in rendering user-controlled data without proper escaping directly enables the injection vector described in the advisory.