CVE-2023-45136: XWiki Platform web templates vulnerable to reflected XSS in the create document form if name validation is enabled
9.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.98155%
CWE
Published
10/25/2023
Updated
11/3/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.xwiki.platform:xwiki-platform-web-templates | maven | >= 12.0-rc-1, < 14.10.12 | 14.10.12 |
| org.xwiki.platform:xwiki-platform-web-templates | maven | >= 15.0-rc-1, < 15.5-rc-1 | 15.5-rc-1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unescaped Velocity template outputs in createinline.vm. The commit diff shows that the fix involved adding $escapetool.xml() wrappers around $services.localization.render() calls for two error messages. This indicates the original code lacked proper output encoding for the templateProvider and allowedSpaces values, which are derived from user-controlled document names. The test cases added in CreateInlinePageTest.java demonstrate that HTML payloads in these parameters were rendered unescaped, confirming the XSS vector.