Loading HuntDB...

GHSA-mq7h-5574-hw9f

GitHub Security Advisory

Cross-Site Request Forgery (CSRF) allowing to delete or rename tags

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

### Impact

It's possible with a simple request to perform deletion or renaming of tags without needing any confirmation, by using a CSRF attack.

### Patches

The problem has been patched in XWiki 13.10.7, 14.4.1 and 14.5RC1.

### Workarounds

It's possible to patch existing instances directly by editing the page Main.Tags and add this kind of check, in the code for renaming and for deleting:
```
#if (!$services.csrf.isTokenValid($request.get('form_token')))
#set ($discard = $response.sendError(401, "Wrong CSRF token"))
#end
```

See the commit with the fix for more information about patching the page: https://github.com/xwiki/xwiki-platform/commit/7fd4cda0590180c4d34f557597e9e10e263def9e

### References

* https://jira.xwiki.org/browse/XWIKI-19748
* https://github.com/xwiki/xwiki-platform/commit/7fd4cda0590180c4d34f557597e9e10e263def9e

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JIRA](https://jira.xwiki.org)
* Email us at [security ML](mailto:[email protected])

Affected Packages

Maven org.xwiki.platform:xwiki-platform-tag-ui
Affected versions: 3.2-milestone-2 (fixed in 13.10.7)
Maven org.xwiki.platform:xwiki-platform-tag-ui
Affected versions: 14.0.0 (fixed in 14.4.1)

Related CVEs

Key Information

GHSA ID
GHSA-mq7h-5574-hw9f
Published
November 21, 2022 10:34 PM
Last Modified
November 21, 2022 10:34 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.xwiki.platform:xwiki-platform-tag-ui
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 28, 2025 6:37 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.