Loading HuntDB...

GHSA-3738-p9x3-mv9r

GitHub Security Advisory

XWiki Platform vulnerable to privilege escalation via properties with wiki syntax that are executed with wrong author

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

### Impact

It's possible to use the right of an existing document content author to execute a text area property.

To reproduce:

* As an admin with programming rights, create a new user without script or programming right.
* Login with the freshly created user.
* Insert the following text in source mode in the about section:
```
{{groovy}}println("hello from groovy!"){{/groovy}}
```
* Click "Save & View"

### Patches

This has been patched in XWiki 14.10, 14.4.7, and 13.10.11.

### Workarounds

No known workaround.

### References
https://jira.xwiki.org/browse/XWIKI-20373

### For more information
If you have any questions or comments about this advisory:

* Open an issue in [Jira](http://jira.xwiki.org/)
* Email us at [Security ML](mailto:[email protected])

Affected Packages

Maven org.xwiki.platform:xwiki-platform-oldcore
Affected versions: 13.10 (fixed in 13.10.11)
Maven org.xwiki.platform:xwiki-platform-legacy-oldcore
Affected versions: 13.10 (fixed in 13.10.11)
Maven org.xwiki.platform:xwiki-platform-oldcore
Affected versions: 14.0 (fixed in 14.4.7)
Maven org.xwiki.platform:xwiki-platform-legacy-oldcore
Affected versions: 14.0 (fixed in 14.4.7)
Maven org.xwiki.platform:xwiki-platform-oldcore
Affected versions: 14.5 (fixed in 14.10)
Maven org.xwiki.platform:xwiki-platform-legacy-oldcore
Affected versions: 14.5 (fixed in 14.10)

Related CVEs

Key Information

GHSA ID
GHSA-3738-p9x3-mv9r
Published
March 3, 2023 10:48 PM
Last Modified
March 3, 2023 10:48 PM
CVSS Score
9.0 /10
Primary Ecosystem
Maven
Primary Package
org.xwiki.platform:xwiki-platform-oldcore
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 23, 2025 6:31 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.