Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.xpn.xwiki.platform.plugins/xwiki-plugin-scheduler
  4. ›
  5. CVE-2023-40573

CVE-2023-40573: Improper Access Control

August 23, 2023

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki supports scheduled jobs that contain Groovy scripts. Currently, the job checks the content author of the job for programming right. However, modifying or adding a job script to a document does not modify the content author. Together with a CSRF vulnerability in the job scheduler, this can be exploited for remote code execution by an attacker with edit right on the wiki. If the attack is successful, an error log entry with “Job content executed” will be produced. This vulnerability has been patched in XWiki 14.10.9 and 15.4RC1.

References

  • github.com/advisories/GHSA-8xhr-x3v8-rghj
  • github.com/xwiki/xwiki-platform/commit/fcdcfed3fe2e8a3cad66ae0610795a2d58ab9662
  • github.com/xwiki/xwiki-platform/security/advisories/GHSA-8xhr-x3v8-rghj
  • jira.xwiki.org/browse/XWIKI-20852

Code Behaviors & Features

Detect and mitigate CVE-2023-40573 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.3 before 14.10.9

Fixed versions

  • 14.10.9

Solution

Upgrade to version 14.10.9 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-284: Improper Access Control
  • CWE-352: Cross-Site Request Forgery (CSRF)

Source file

maven/com.xpn.xwiki.platform.plugins/xwiki-plugin-scheduler/CVE-2023-40573.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:00 +0000.