-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.xwiki.platform:xwiki-platform-invitation-ui | maven | >= 2.4-m-2, < 14.4.8 | 14.4.8 |
| org.xwiki.platform:xwiki-platform-invitation-ui | maven | >= 14.5, < 14.10.4 | 14.10.4 |
| org.xwiki.platform:xwiki-platform-invitation-ui | maven | >= 15.0-rc-1, < 15.0 | 15.0 |
The vulnerability stems from improper escaping of user-controlled input in Velocity templates used by the Invitation application. The patch specifically adds escaping using $services.rendering.escape() for parameters passed to localization messages and dynamically generated content. Files like InvitationGuestActions.xml and InvitationCommon.xml show direct modifications where unescaped parameters were previously inserted into executable code contexts. These unescaped parameters allowed attackers to inject Velocity/Groovy code via URL parameters, which would be executed with programming rights due to the document's sheet context.
Ongoing coverage of React2Shell