CVE-2024-43401

high

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A user without script/programming right can trick a user with elevated rights to edit a content with a malicious payload using a WYSIWYG editor. The user with elevated rights is not warned beforehand that they are going to edit possibly dangerous content. The payload is executed at edit time. This vulnerability has been patched in XWiki 15.10RC1.

References

https://jira.xwiki.org/browse/XWIKI-21490

https://jira.xwiki.org/browse/XWIKI-21489

https://jira.xwiki.org/browse/XWIKI-21488

https://jira.xwiki.org/browse/XWIKI-21487

https://jira.xwiki.org/browse/XWIKI-21486

https://jira.xwiki.org/browse/XWIKI-21485

https://jira.xwiki.org/browse/XWIKI-21484

https://jira.xwiki.org/browse/XWIKI-21483

https://jira.xwiki.org/browse/XWIKI-21482

https://jira.xwiki.org/browse/XWIKI-21481

https://jira.xwiki.org/browse/XWIKI-21311

https://jira.xwiki.org/browse/XWIKI-20331

https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-f963-4cq8-2gw7

Details

Source: Mitre, NVD

Published: 2024-08-19

Updated: 2024-08-20

Risk Information

CVSS v2

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Severity: High