Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.xwiki.platform/xwiki-platform-menu
  4. ›
  5. CVE-2023-37909

CVE-2023-37909: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

October 25, 2023

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 5.1-rc-1 and prior to versions 14.10.8 and 15.3-rc-1, any user who can edit their own user profile can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. This has been patched in XWiki 14.10.8 and 15.3-rc-1 by adding proper escaping. As a workaround, the patch can be manually applied to the document Menu.UIExtensionSheet; only three lines need to be changed.

References

  • github.com/advisories/GHSA-v2rr-xw95-wcjx
  • github.com/xwiki/xwiki-platform/commit/9e8f080094333dec63a8583229a3799208d773be
  • github.com/xwiki/xwiki-platform/security/advisories/GHSA-v2rr-xw95-wcjx
  • jira.xwiki.org/browse/XWIKI-20746
  • nvd.nist.gov/vuln/detail/CVE-2023-37909

Code Behaviors & Features

Detect and mitigate CVE-2023-37909 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 5.1-rc-1 before 14.10.8

Fixed versions

  • 14.10.8

Solution

Upgrade to version 14.10.8 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

maven/org.xwiki.platform/xwiki-platform-menu/CVE-2023-37909.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:01 +0000.