Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.xwiki.platform/xwiki-platform-oldcore
  4. ›
  5. CVE-2024-37899

CVE-2024-37899: XWiki Platform allows remote code execution from user account

June 20, 2024 (updated February 5, 2025)

When an admin disables a user account, the user’s profile is executed with the admin’s rights. This allows a user to place malicious code in the user profile before getting an admin to disable the user account.

To reproduce, as a user without script nor programming rights, edit the about section of your user profile and add {{groovy}}services.logging.getLogger("attacker").error("Hello from Groovy!"){{/groovy}}. As an admin, go to the user profile and click the “Disable this account” button. Then, reload the page. If the logs show attacker - Hello from Groovy! then the instance is vulnerable.

References

  • github.com/advisories/GHSA-j584-j2vj-3f93
  • github.com/xwiki/xwiki-platform
  • github.com/xwiki/xwiki-platform/commit/046c36519a2df392c922c16d0d38472b98c414d0
  • github.com/xwiki/xwiki-platform/commit/233b08b26580df4b7a595882dac65ed4e4a2419c
  • github.com/xwiki/xwiki-platform/commit/2b55c29562ccd20f8f0f85075f0c95b4ee9cd9be
  • github.com/xwiki/xwiki-platform/commit/f8409419c5d0ddefe1bee55e73629a54275fa735
  • github.com/xwiki/xwiki-platform/commit/f89c8f47fad6e5cc7e68c69a7e0acde07f5eed5a
  • github.com/xwiki/xwiki-platform/security/advisories/GHSA-j584-j2vj-3f93
  • jira.xwiki.org/browse/XWIKI-21611
  • nvd.nist.gov/vuln/detail/CVE-2024-37899

Code Behaviors & Features

Detect and mitigate CVE-2024-37899 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 15.0-rc-1 before 15.5.5, all versions starting from 15.6-rc-1 before 15.10.6, all versions starting from 13.4.7 before 14.10.21, all versions starting from 13.10.3 before 14.10.21, all versions starting from 16.0.0-rc-1 before 16.0.0

Fixed versions

  • 14.10.21
  • 14.10.21
  • 15.5.5
  • 15.10.6
  • 16.0.0

Solution

Upgrade to versions 14.10.21, 14.10.21, 15.10.6, 15.5.5, 16.0.0 or above.

Impact 9 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-266: Incorrect Privilege Assignment
  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

maven/org.xwiki.platform/xwiki-platform-oldcore/CVE-2024-37899.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:37 +0000.