Loading HuntDB...

GHSA-859x-p6jp-rc2w

GitHub Security Advisory

xwiki contains Incorrect Authorization

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Impact

It's possible to execute a script with the right of another user (provided the target user does not have programming right).

For example, the following:

```
{{context document="xwiki:XWiki.userwithscriptright" transformationContext="document"}}{{velocity}}Hello from Velocity!{{/velocity}}{{/context}}
```

written by a user not having script right (for example in the user's profile) should produce an error (the user is not allowed to write scripts). However, because of the vulnerability, if the author of the document "xwiki:XWiki.userwithscriptright" has script right (but not programming right) the script will be executed with as if it was written by the target user.

### Patches

The problem has been patched in XWiki 14.8RC1, 14.4.5 and 13.10.10.

### Workarounds

There's no workaround for this issue.

### References

https://jira.xwiki.org/browse/XWIKI-19856

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JIRA](https://jira.xwiki.org)
* Email us at [security ML](mailto:[email protected])

Affected Packages

Maven org.xwiki.platform:xwiki-platform-rendering-macro-context
Affected versions: 3.0-milestone-1 (fixed in 13.10.10)
Maven org.xwiki.platform:xwiki-platform-rendering-macro-context
Affected versions: 14.0-rc-1 (fixed in 14.4.5)
Maven org.xwiki.platform:xwiki-platform-rendering-macro-context
Affected versions: 14.5 (fixed in 14.8-rc-1)

Related CVEs

Key Information

GHSA ID
GHSA-859x-p6jp-rc2w
Published
March 3, 2023 10:54 PM
Last Modified
March 3, 2023 10:54 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.xwiki.platform:xwiki-platform-rendering-macro-context
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 22, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.