Loading HuntDB...

GHSA-j9h5-vcgv-2jfm

GitHub Security Advisory

XWiki Platform vulnerable to RXSS via editor parameter - importinline template

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

### Impact

It's possible to execute javascript with the right of any user by leading him to a special URL on the wiki targeting a page which contains an attachment.

To reproduce:
* add an attachment to a page (for example, your user profile)
* add `?xpage=importinline&editor=%22%3E%3Cimg%20src%20onerror=alert(document.domain)%3E` to the page view URL as in `https://myhost/xwiki/bin/view/XWiki/MyUser?xpage=importinline&editor=%22%3E%3Cimg%20src%20onerror=alert(document.domain)%3E`

### Patches

This has been patched in XWiki 15.0-rc-1, 14.10.4 and 14.4.8.

### Workarounds

The easiest is to edit file `<xwiki app>/templates/importinline.vm` and apply the modification described on https://github.com/xwiki/xwiki-platform/commit/28905f7f518cc6f21ea61fe37e9e1ed97ef36f01

### References

https://jira.xwiki.org/browse/XWIKI-20340
https://app.intigriti.com/company/submissions/e95a7ad5-7029-4627-abf0-3e3e3ea0b4ce/XWIKI-E93DFEYK

### Attribution

This vulnerability has been reported on Intigriti by René de Sain @renniepak.

Affected Packages

Maven org.xwiki.platform:xwiki-platform-distribution-war
Affected versions: 2.2-milestone-1 (fixed in 14.4.8)
Maven org.xwiki.platform:xwiki-platform-distribution-war
Affected versions: 14.5 (fixed in 14.10.4)

Related CVEs

Key Information

GHSA ID
GHSA-j9h5-vcgv-2jfm
Published
May 9, 2023 5:46 PM
Last Modified
May 9, 2023 6:44 PM
CVSS Score
9.0 /10
Primary Ecosystem
Maven
Primary Package
org.xwiki.platform:xwiki-platform-distribution-war
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 23, 2025 6:31 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.