Miggo Logo

CVE-2024-56158:
XWiki allows SQL injection in query endpoint of REST API with Oracle

N/A

CVSS Score

Basic Information

EPSS Score
-
Published
6/12/2025
Updated
6/12/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.xwiki.platform:xwiki-platform-oldcoremaven>= 1.0, < 15.10.1615.10.16
org.xwiki.platform:xwiki-platform-oldcoremaven>= 16.0.0-rc-1, < 16.4.716.4.7
org.xwiki.platform:xwiki-platform-oldcoremaven>= 16.5.0-rc-1, < 16.10.216.10.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided commit information consists only of version bump and SCM tag updates in pom.xml files for the release versions 15.10.16, 16.4.7, and 16.10.2. These commits do not contain the actual code changes that patched the SQL injection vulnerability (XWIKI-22734). The Jira issue XWIKI-22734, which describes the vulnerability, does not link to specific commits. The advisory states that the vulnerability lies in the XWiki query validator not sanitizing functions like DBMS_XMLGEN or DBMS_XMLQUERY when used with Oracle, and Hibernate allowing native functions in HQL. While the affected package is org.xwiki.platform:xwiki-platform-oldcore, without the actual patch diffs, it's impossible to pinpoint the exact vulnerable functions, their file paths, and provide concrete patch evidence. The Jira ticket XWIKI-22734 also references XWIKI-22691, suggesting the fix might be in a related area, but without commit details for either, a precise analysis is not possible. Therefore, no vulnerable functions can be identified with the required level of confidence and evidence.

evidence.

.evidence. confidence and evidence

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t It's possi*l* to *x**ut* *ny SQL qu*ry in Or**l* *y usin* t** *un*tion lik* [**MS_XML**N or **MS_XMLQU*RY](*ttps://*o*s.or**l*.*om/*n/**t***s*/or**l*/or**l*-**t***s*/**/*rpls/**MS_XML**N.*tml). T** XWiki qu*ry v*li**tor *o*s not s*nitiz*

Reasoning

T** provi*** *ommit in*orm*tion *onsists only o* v*rsion *ump *n* S*M t** up**t*s in `pom.xml` *il*s *or t** r*l**s* v*rsions **.**.**, **.*.*, *n* **.**.*. T**s* *ommits *o not *ont*in t** **tu*l *o** ***n**s t**t p*t**** t** SQL inj**tion vuln*r**i