-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from two key issues in SecureHTMLElementSanitizer.java: 1) The original DATA_ATTR pattern (^data-[-\w.\u00B7-\uFFFF]) allowed invalid XML characters like '/' and '>' by using a broad Unicode range. 2) The .find() method was used instead of .matches(), allowing partial matches. Together, these permitted attributes like 'data-x/onmouseover' which bypassed validation. The patched commit specifically addresses both issues by tightening the regex to XML Name production rules and switching to .matches(). The isAttributeAllowed function is the direct validation gatekeeper for attributes, making it the clear vulnerable entry point.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.xwiki.commons:xwiki-commons-xml | maven | >= 14.6-rc-1, < 14.10.4 | 14.10.4 |