-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stemmed from how the NotificationRSSService handled RSS feed generation. The original implementation used Velocity templating with a code macro that processed the feed content as XWiki syntax. This allowed user-supplied macro syntax in profile fields to be executed when rendered in the RSS output. The patch directly writes the feed to the response stream, bypassing dangerous rendering transformations. The key vulnerable code was the combination of: 1) Using $services.localization.render with syntax specification in templates, and 2) Wrapping getFeed() output in a code macro without the 'source' parameter, enabling macro expansion of user-controlled content.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.xwiki.platform:xwiki-platform-notifications-ui | maven | >= 9.6-rc-1, < 14.10.6 | 14.10.6 |
| org.xwiki.platform:xwiki-platform-notifications-ui | maven | >= 15.0-rc-1, < 15.2-rc-1 | 15.2-rc-1 |
KEV Misses 88% of Exploited CVEs- Get the report