Loading HuntDB...

GHSA-jp4x-w9cj-97q7

GitHub Security Advisory

XWiki allows remote code execution through preview of XClass changes in AWM editor

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

### Impact
Any XWiki user with edit right on at least one App Within Minutes application (the default for all users XWiki) can obtain programming right/perform remote code execution by editing the application. The detailed reproduction steps can be found in the [original bug report](https://jira.xwiki.org/browse/XWIKI-22719).

### Patches
This vulnerability has been fixed in XWiki 17.0.0, 16.4.7, and 16.10.3.

### Workarounds
Restricting edit rights on all existing App Within Minutes applications to trusted users mitigates at least the PoC exploit, but we can't exclude that there are other ways to exploit this vulnerability.

Affected Packages

Maven org.xwiki.platform:xwiki-platform-oldcore
Affected versions: 7.2-milestone-2 (fixed in 16.4.7)
Maven org.xwiki.platform:xwiki-platform-oldcore
Affected versions: 16.5.0-rc-1 (fixed in 16.10.3)
Maven org.xwiki.platform:xwiki-platform-oldcore
Affected versions: 17.0.0-rc-1 (fixed in 17.0.0)

Related CVEs

Key Information

GHSA ID
GHSA-jp4x-w9cj-97q7
Published
June 13, 2025 8:46 PM
Last Modified
June 13, 2025 8:46 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.xwiki.platform:xwiki-platform-oldcore
GitHub Reviewed
✓ Yes

Dataset

Last updated: June 18, 2025 6:25 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.