-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from unsanitized use of the xredirect parameter in the DeleteApplication.xml Velocity template. The pre-patch code (shown in the commit diff) directly assigned $cancelURL = $request.xredirect and propagated this value into URL parameters. This lack of validation allowed JavaScript URI schemes like 'javascript:alert()' to be executed. The fix introduced #getSanitizedURLAttributeValue to sanitize the URL, confirming that the original code lacked proper input validation. The Jira tickets (XWIKI-20614/XWIKI-20583) explicitly reference the need for URL sanitization in templates, and the CWE-79/CWE-87 classifications match this XSS pattern.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.xwiki.platform:xwiki-platform-appwithinminutes-ui | maven | >= 6.2-milestone-1, < 14.10.5 | 14.10.5 |
| org.xwiki.platform:xwiki-platform-appwithinminutes-ui | maven | >= 15.0-rc-1, < 15.1-rc-1 | 15.1-rc-1 |
KEV Misses 88% of Exploited CVEs- Get the report