-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from improper escaping in the registration success message template. The original code used $request.get() to concatenate user-provided first/last names into a wiki link syntax [[$fullName>>...]]. This allowed attackers to close the existing Velocity/HTML tags and inject Groovy code. The patch replaced this with $xwiki.getUserName() which properly escapes output, confirming the vulnerability was in the template's handling of raw user input. The file modification in RegistrationConfig.xml and the CWE-94/CWE-95 classifications directly point to code injection in template processing as the root cause.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.xwiki.platform:xwiki-platform-administration-ui | maven | >= 2.2, < 14.10.17 | 14.10.17 |
| org.xwiki.platform:xwiki-platform-administration-ui | maven | >= 15.0-rc-1, < 15.5.3 | 15.5.3 |
| org.xwiki.platform:xwiki-platform-administration-ui |
| maven |
| >= 15.6-rc-1, < 15.8-rc-1 |
| 15.8-rc-1 |
Ongoing coverage of React2Shell