Loading HuntDB...

GHSA-j7p2-87q3-44w7

GitHub Security Advisory

XWiki does not require right warnings for notification displayer objects

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Impact
When a user without script right creates a document with an `XWiki.Notifications.Code.NotificationDisplayerClass` object, and later an admin edits and saves that document, the possibly malicious content of that object is output as raw HTML, allowing XSS attacks. While the notification displayer executes Velocity, the existing generic analyzer already warns admins before editing Velocity code. Note that warnings before editing documents with dangerous properties have only been introduced in XWiki 15.9, before that version, this was a known issue and the advice was simply to be careful.

### Patches
This vulnerability has been patched in XWiki 15.10.16, 16.4.7, and 16.10.2 by adding a required rights analyzer that warns the admin before editing about the possibly malicious code.

### Workarounds
We're not aware of any real workarounds apart from just being careful with editing documents previously edited by untrusted users as a user with script, admin or programming right.

Affected Packages

Maven org.xwiki.platform:xwiki-platform-notifications-notifiers-default
Affected versions: 15.9-rc-1 (fixed in 15.10.16)
Maven org.xwiki.platform:xwiki-platform-notifications-notifiers-default
Affected versions: 16.0.0-rc-1 (fixed in 16.4.7)
Maven org.xwiki.platform:xwiki-platform-notifications-notifiers-default
Affected versions: 16.5.0-rc-1 (fixed in 16.10.2)

Related CVEs

Key Information

GHSA ID
GHSA-j7p2-87q3-44w7
Published
June 13, 2025 8:45 PM
Last Modified
June 13, 2025 8:45 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.xwiki.platform:xwiki-platform-notifications-notifiers-default
GitHub Reviewed
✓ Yes

Dataset

Last updated: June 18, 2025 6:25 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.