Loading HuntDB...

GHSA-gjmq-x5x7-wc36

GitHub Security Advisory

XWiki Platform vulnerable to Cross-site Scripting in the deleted attachments list

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

### Impact

It's possible to store a JavaScript which will be executed by anyone viewing the deleted attachments index with an attachment containing javascript in its name.

For example, attachment a file with name `><img src=1 onerror=alert(1)>.jpg` will execute the alert.

### Patches

This issue has been patched in XWiki 13.10.6 and 14.3.

### Workarounds

It is possible to modify fix the vulnerability by editing the wiki page `XWiki.DeletedAttachments` with the object editor, open the `JavaScriptExtension` object and apply on the content the changes that can be found on the commit https://github.com/xwiki/xwiki-platform/commit/6705b0cd0289d1c90ed354bd4ecc1508c4b25745.

### References

* https://jira.xwiki.org/browse/XWIKI-19613

### For more information

If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])

Affected Packages

Maven org.xwiki.platform:xwiki-platform-index-ui
Affected versions: 2.2-milestone-1 (fixed in 13.10.6)
Maven org.xwiki.platform:xwiki-platform-index-ui
Affected versions: 14.0 (fixed in 14.3)

Related CVEs

Key Information

GHSA ID
GHSA-gjmq-x5x7-wc36
Published
September 16, 2022 5:39 PM
Last Modified
September 16, 2022 5:39 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.xwiki.platform:xwiki-platform-index-ui
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 23, 2025 6:31 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.