Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.xwiki.platform/xwiki-platform-web-templates
  4. ›
  5. CVE-2026-40105

CVE-2026-40105: XWiki has Reflected Cross-Site Scripting (XSS) in page history compare

April 14, 2026 (updated April 27, 2026)

A reflected cross-site scripting vulnerability (XSS) in the compare view between revisions of a page allows executing JavaScript code in the user’s browser. If the current user is an admin, this can not only affect the current user but also the confidentiality, integrity and availability of the whole XWiki instance.

References

  • github.com/advisories/GHSA-w4fj-87j5-f25c
  • github.com/xwiki/xwiki-platform
  • github.com/xwiki/xwiki-platform/commit/3c8a2ec985641367015c2db937574fcd360c788c
  • github.com/xwiki/xwiki-platform/security/advisories/GHSA-w4fj-87j5-f25c
  • jira.xwiki.org/browse/XWIKI-23472
  • nvd.nist.gov/vuln/detail/CVE-2026-40105

Code Behaviors & Features

Detect and mitigate CVE-2026-40105 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 10.4-rc-1 before 16.10.16, all versions starting from 17.0.0-rc-1 before 17.4.8, all versions starting from 17.5.0-rc-1 before 17.10.1

Fixed versions

  • 16.10.16
  • 17.4.8
  • 17.10.1

Solution

Upgrade to versions 16.10.16, 17.10.1, 17.4.8 or above.

Impact 6.1 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

Source file

maven/org.xwiki.platform/xwiki-platform-web-templates/CVE-2026-40105.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:09 +0000.