-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.xwiki.platform:xwiki-platform-flamingo-skin-resources | maven | >= 9.4-rc-1, < 14.10.5 | 14.10.5 |
| org.xwiki.platform:xwiki-platform-flamingo-skin-resources | maven | >= 15.0-rc-1, < 15.1-rc-1 | 15.1-rc-1 |
The vulnerability stems from improper handling of the xredirect parameter in the restore.vm template. The original vulnerable code (pre-patch) directly set $cancelUrl = "$request.xredirect" when a redirect parameter was present. This allowed attackers to inject javascript: URIs. The fix introduced #getSanitizedURLAttributeValue macro usage and explicit escaping, confirming that the direct parameter usage without validation/sanitization was the vulnerable pattern. The file path and vulnerable code pattern are explicitly shown in the commit diff and Jira ticket analysis.