Loading HuntDB...

GHSA-9qrp-h7fw-42hg

GitHub Security Advisory

Path Traversal in XWiki Platform

✓ GitHub Reviewed LOW Has CVE

Advisory Details

### Impact

One can ask for any file located in the classloader using the template API and a path with ".." in it. For example

```
{{template name="../xwiki.hbm.xml"/}}
```

To our knownledge none of the available files of the classloader in XWiki Standard contain any strong confidential data, hence the low confidentiality value of this advisory.

### Patches

The issue is patched in versions 14.0 and 13.10.3.

### Workarounds

There's no easy workaround for this issue, administrators should upgrade their wiki.

### References

* https://jira.xwiki.org/browse/XWIKI-19349
* https://github.com/xwiki/xwiki-platform/commit/4917c8f355717bb636d763844528b1fe0f95e8e2

### For more information

If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [security mailing list](mailto:[email protected])

Affected Packages

Maven org.xwiki.platform:xwiki-platform-oldcore
Affected versions: 8.3-rc-1 (fixed in 13.10.3)

Related CVEs

Key Information

GHSA ID
GHSA-9qrp-h7fw-42hg
Published
June 1, 2022 7:56 PM
Last Modified
June 1, 2022 7:56 PM
CVSS Score
2.5 /10
Primary Ecosystem
Maven
Primary Package
org.xwiki.platform:xwiki-platform-oldcore
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 23, 2025 6:31 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.