CVE-2024-21650:
XWiki Remote Code Execution Vulnerability via User Registration
10
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99805%
CWE
Published
1/8/2024
Updated
1/11/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.xwiki.platform:xwiki-platform-administration-ui | maven | >= 2.2, < 14.10.17 | 14.10.17 |
org.xwiki.platform:xwiki-platform-administration-ui | maven | >= 15.0-rc-1, < 15.5.3 | 15.5.3 |
org.xwiki.platform:xwiki-platform-administration-ui | maven | >= 15.6-rc-1, < 15.8-rc-1 | 15.8-rc-1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper escaping in the registration success message template. The original code used $request.get()
to concatenate user-provided first/last names into a wiki link syntax [[$fullName>>...]]. This allowed attackers to close the existing Velocity/HTML tags and inject Groovy code. The patch replaced this with $xwiki.getUserName()
which properly escapes output, confirming the vulnerability was in the template's handling of raw user input. The file modification in RegistrationConfig.xml
and the CWE-94/CWE-95
classifications directly point to code injection in template processing as the root cause.