Loading HuntDB...

GHSA-9cqm-5wf7-wcj7

GitHub Security Advisory

XWiki Platform users may execute anything with superadmin right through comments and async macro

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

### Impact

Comments are supposed to be executed with the right of superadmin but in restricted mode (anything dangerous is disabled) but the async macro is not taking into account the restricted mode.

This means that any user with comment right can use the async macro to make it execute any wiki content with the right of superadmin as in:

{{async}}
{{groovy}}println "it works !"{{/groovy}}
{{/async}}

### Patches

This has been patched in XWiki 14.9, 14.4.6, and 13.10.10.

### Workarounds

The only known workaround consists in applying [the following patch](https://github.com/xwiki/xwiki-platform/commit/00532d9f1404287cf3ec3a05056640d809516006) and rebuilding and redeploying `org.xwiki.platform:xwiki-platform-rendering-async-macro`.

### References

* https://jira.xwiki.org/browse/XWIKI-20234

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](http://jira.xwiki.org)
* Email us at [Security ML](mailto:[email protected])

Affected Packages

Maven org.xwiki.platform:xwiki-platform-rendering-async-macro
Affected versions: 11.6-rc-1 (fixed in 13.10.10)
Maven org.xwiki.platform:xwiki-platform-rendering-async-macro
Affected versions: 14.0 (fixed in 14.4.6)
Maven org.xwiki.platform:xwiki-platform-rendering-async-macro
Affected versions: 14.5 (fixed in 14.9)

Related CVEs

Key Information

GHSA ID
GHSA-9cqm-5wf7-wcj7
Published
March 3, 2023 10:49 PM
Last Modified
March 3, 2023 10:49 PM
CVSS Score
9.0 /10
Primary Ecosystem
Maven
Primary Package
org.xwiki.platform:xwiki-platform-rendering-async-macro
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 22, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.