Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2023-45136 β€” AI Deep Analysis Summary

CVSS 9.7 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Reflected XSS in XWiki Platform. πŸ“‰ **Consequences**: Attackers inject malicious scripts via document name validation. Victims executing the link suffer arbitrary action execution under their own rights.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-79 (Cross-site Scripting). πŸ’₯ **Flaw**: Improper neutralization of user input during document name validation when specific name strategies are enabled.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: XWiki Platform. πŸ“… **Versions**: 12.0-rc-1 through 12.10.11 AND 15.0 through 15.5-rc-1. 🏒 **Vendor**: XWiki Foundation.

Q4What can hackers do? (Privileges/Data)

πŸ’£ **Hackers Can**: Execute arbitrary JavaScript actions. 🎭 **Privileges**: Act with the **victim user's rights**. πŸ“‚ **Data**: Potential access to sensitive wiki content or configuration based on user permissions.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: Medium. πŸ”‘ **Auth**: No authentication required for the vulnerability itself. πŸ–±οΈ **Config**: Requires User Interaction (UI:R) to click a malicious link.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Public Exp?**: Yes. πŸ“œ **PoC**: Available via Nuclei templates (ProjectDiscovery). 🌐 **Link**: https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-45136.yaml

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for XWiki instances. πŸ§ͺ **Feature**: Check if 'Name Strategy' validation is enabled. πŸ› οΈ **Tool**: Use Nuclei with the specific CVE template to detect the reflection point.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. 🩹 **Patch**: Update to **12.10.12+** or **15.5-rc-1+**. πŸ”— **Commit**: ba56fda175156dd35035f2b8c86cbd8ef1f90c2e. πŸ“’ **Advisory**: GHSA-qcj9-gcpg-4w2w.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Disable the specific **Name Strategy** for document name validation. πŸ›‘ **Mitigation**: Ensure the feature is turned off if not strictly needed. This prevents the input vector from being triggered.

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: High Priority. 🚨 **Reason**: CVSS Score is High (C:H, I:H, A:H). πŸ“‰ **Impact**: Full compromise of user context. πŸƒ **Action**: Patch immediately or disable the vulnerable configuration.