Loading HuntDB...

GHSA-vr59-gm53-v7cq

GitHub Security Advisory

XWiki Platform vulnerable to SQL injection through getdeleteddocuments.vm template sort parameter

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

### Impact

It's possible for anyone to inject SQL using the parameter sort of the `getdeleteddocuments.vm`. It's injected as is as an ORDER BY value.

One can see the result of the injection with http://127.0.0.1:8080/xwiki/rest/liveData/sources/liveTable/entries?sourceParams.template=getdeleteddocuments.vm&sort=injected (this example does not work, but it shows that an HQL query was executed with the passed value which look nothing like an order by value, without any kind of sanitation).

### Patches

This has been patched in 17.3.0-rc-1, 16.10.6.

### Workarounds

There is no known workaround, other than upgrading XWiki.

### References

https://jira.xwiki.org/browse/XWIKI-23093

### For more information

If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])

### Attribution

The vulnerability was identifier by Aleksey Solovev from Positive Technologies.

Affected Packages

Maven org.xwiki.platform:xwiki-platform-distribution-war
Affected versions: 9.4-rc-1 (fixed in 16.10.6)
Maven org.xwiki.platform:xwiki-platform-distribution-war
Affected versions: 17.0.0-rc-1 (fixed in 17.3.0-rc-1)

Related CVEs

Key Information

GHSA ID
GHSA-vr59-gm53-v7cq
Published
July 24, 2025 6:09 PM
Last Modified
July 25, 2025 1:32 PM
CVSS Score
9.0 /10
Primary Ecosystem
Maven
Primary Package
org.xwiki.platform:xwiki-platform-distribution-war
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 2, 2025 6:46 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.