-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.xwiki.platform:xwiki-platform-search-ui | maven | >= 4.5-rc-1, < 14.10.15 | 14.10.15 |
| org.xwiki.platform:xwiki-platform-search-ui | maven | >= 15.0-rc-1, < 15.5.2 | 15.5.2 |
| org.xwiki.platform:xwiki-platform-search-ui | maven | >= 15.6-rc-1, < 15.7-rc-1 | 15.7-rc-1 |
The vulnerability stems from missing escaping in the SearchAdmin interface template (SearchAdmin.xml). The commit diff shows critical additions of $escapetool.xml() and services.rendering.escape() calls to parameters that were previously rendered raw. The reproduction steps demonstrate that unescaped user-controlled values from XWiki.UIExtensionClass objects (id and label) were being interpreted as XWiki syntax, enabling script macro execution. The vulnerable code paths are the template interpolations that process these extension properties without sanitization, particularly in HTML attribute contexts and macro references.
Ongoing coverage of React2Shell